Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Tekie Geek a call at (347) 830-7322.

This Data Privacy Day, the NCSA Wants You to STOP....
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Productivity Managed Service Provider Tablet IT services Staten Island Disaster IT consulting Staten Island Virus Two-factor Authentication Managed IT Services Start Menu Gadgets data recovery Staten Island Information Technology Google Wallet Regulation staten island managed services Microsoft Office Legal PDF Printing data loss WiFi Blockchain Google Calendar Language Content Cabling Help Desk CrashOverride Software Health Downloads IT consulting NYC Password Drones Cache Computer Computer Care Hosted Solutions Time Management Gamification Emergency Touchscreen Alert Web Server Cleaning end-user files Quick Tips IT consulting BYOD Nanotechnology Small Business Powerful Technology Solutions IT support firms Redundancy Ransomware Training BDR Hiring/Firing HTML IT support NYC IT Management Artificial Intelligence Business Management Sports Managed Service Network Management Workers Visible Light Communication Website IT consulting company Wi-Fi Machine Learning Tech Terms Document Management computer support firms Smartphone SaaS computer support Staten Island Streaming Media Wireless Headphones Save Money Laptops IT support Staten Island Maintenance Recovery Computers Addiction IT consulting firm Update Bring Your Own Device Staten Island computer support Conferencing Privacy Safety Data Breach Digital Payment Big Data Downtime G Suite IT consulting Staten island Microsoft Excel Television Managed IT Services Social Bandwidth Motion Sickness Monitors Memory Software as a Service Retail Telephony Computing Mouse Law Enforcement Facebook Hosted Solution Travel Going Green Google Docs Cybercrime Spam managed services Staten Island Mobile Device Management Antivirus IT services NYC Education Settings Apple Telephone Systems Hardware IT consulting firms Deep Learning Documents VPN Tactics Notifications Outlook Internet of Things Microsoft Data storage Windows 10 Telephone Google Drive CCTV Congratulations Mobile Device Freedom of Information today ’s organizations computer services Staten Island Firewall Business Continuity Multi-factor Authentication Tablets Unified Threat Management History managed services datto malware worms Hard Drive Disposal Tech Support Unified Threat Management Tip of the week Data computer repair Data Backup Business Cards VoIP Unified Communications App Workplace Tips Supercomputer Hacker Cybersecurity Internet data recovery Windows Proactive IT tech support Staten Isalnd How To Administrator Holiday Rental Service Hackers Vendor Mangement Applications Websites Displays Outsourced IT Digital Encryption Tip of the Week Company Culture Private Cloud Database Scalability Data Management Android Meetings Regulations Word Managed IT Google Networking Screen Reader 3D Printing Cloud computing Staten Island Email Business Technology Running Cable IT Services Reliable Computing Desktop Society Wireless Technology Vulnerability Error it support Customer Service Vulnerabilities Google Maps Accidental deletion Relocation Administration Processors Disaster Recovery Accountants Service Level Agreement Access Control malware Hard disk managed IT services staten island Innovation Hack computer repair Staten Island Thank You Data Protection Tech Term Politics Windows 10 IT Consultant Compliance Staten Island tech support Banking Best Practice Fake News Project Management Security SharePoint Business Chromebook Twitter Browser IT support Staten Islans Business Growth Employer Employee Relationship Public Cloud Monitoring IT support New York City Remote Computing Customer Resource management Bitcoin Computer Malfunction Mobile Devices Staten Island IT consulting Server Budget Spyware Taxes File Sharing Phishing Passwords Hacking managed it services Virtual Desktop Text Messaging Virtual Reality Automation Lenovo Office Specifications DDoS Communication IT support Device security Uninterrupted Power Supply Writing Saving Money Government Cortana Business Mangement Emails tech support Smartphones Network Congestion Remote Monitoring Workstations Social Network Music Trends Flash Multi-Factor Security Botnet Network Security tech support Staten Island Knowledge Malware Business Metrics Windows XP computer services Analytics Automobile Legislation Work/Life Balance In Internet of Things Corporate Profile Technology Upgrade email scam Content Filtering Social Engineering eWaste Operating System Audit Paperless Office Gmail Mobile Security Staffing Mobile Technology computer support News Domains Patch Management Mobility Management Information Cloud Computing IBM Vendor Management Solid State Drive Comparison Scam Computing Infrastructure IT services New York City computer support NYC Miscellaneous managed IT services NYC Business Computing Worker Tracking Distributed Denial of Service Download Equifax Lithium-ion battery Social Media CryptoLocker Samsung Devices Cloud Experience Virtualization Backup Backup and Disaster Recovery Upload Cryptocurrency Access Apps Data Security Software License Staten Island IT support Office 365 Microchip Efficiency Network Identity Theft YouTube ransomware attacks Wireless Robot Collaboration Productivity Piracy Search Securty Startup Virtual Assistant VoIP LiFi Hardware Solutions Physical Security Managing Stress Flexibility Black Market The Internet of Things Hard Drive Money User Tips Cost Management Webcam Username Best Practices Laptop IT Support Windows 8 Printer Employer-Employee Relationship communications Augmented Reality Advertising Bluetooth Office Tips Hacks End of Support Excel

Newsletter Sign Up