Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Tekie Geek a call at (347) 830-7322.

This Data Privacy Day, the NCSA Wants You to STOP....
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

tech support Staten Isalnd In Internet of Things IT consulting firm Small Business Collaboration eWaste Staffing Managed IT Office 365 Staten Island IT consulting Processor Unified Threat Management Security Proxy Server SharePoint Wireless Technology Management Data Analysis SSID Mobile Technology IT services NYC Google Drive Accountants Holiday Modem Travel Google Ransomware Entertainment Web Server it support Patch Management Network Startup Hard Drive Deep Learning Administrator CryptoLocker Virtual Assistant Vulnerability Data Protection Bluetooth Windows 10 Laptop Fileless Malware Website Tech Term Hard Drive Disposal Staten Island computer support Windows 10 Hosted Solution Quick Tips Company Culture Thank You History Telephony Content Filtering Hackers Gadgets Microsoft IT support NYC Term computer repair Staten Island Efficiency LiFi Banking Business Mangement Going Green IT support firms Encryption Google Wallet Mobile Devices Bring Your Own Device Error How To Network Congestion Audit Data Breach Printers Devices User Tips Productivity Social Media Piracy Facebook PowerPoint computer services Spyware Cache VPN Automobile Apps Regulations Addiction Office Tips Virus Health Hosted Solutions malware Hard disk IT Consultant Retail Hack Compliance Service Level Agreement Big Data Internet of Things managed IT services staten island computer support NYC Digital Artificial Intelligence Distributed Denial of Service Browsers Browser Scalability Documents Miscellaneous tech support Business Computing Trends Disaster Recovery communications Tracking Cybercrime Computers Two-factor Authentication Bookmark Safety Business Management Business Metrics IBM G Suite data loss The Internet of Things Music Multi-factor Authentication Remote Computing Flash Memory IT consulting Laptops Running Cable Business Cards data recovery Drones Education Emails Managed IT Services Botnet Cortana Firewall App Backup email scam Visible Light Communication Touchscreen Tech Terms ransomware attacks Managing Stress Physical Security CCTV Proactive IT Recovery Business Growth computer support computer support firms Printing Freedom of Information Sports Desktop Cryptocurrency Malware Windows 8 Cloud Computing Access Control Samsung Mobility Politics Remote Monitoring Corporate Profile File Sharing BDR Identity Theft Robot Networking Money Managed Service Provider Update Social Engineering Mouse Data Backup Help Desk Google Play Business Continuity Outlook IT support New York City Cloud Computing Infrastructure Scam Solid State Drive IT consulting Staten Island YouTube Gmail Printer VoIP Microsoft Office Disaster Customer Resource management Employer-Employee Relationship Information Technology CrashOverride Lenovo WiFi Congratulations Powerful Technology Solutions Network Management Computer Malfunction Best Practice Start Menu Android Vendor Mangement Tech Microchip DDoS Managed Service Saving Money Television Search Software Fake News Vulnerabilities Computer Private Cloud IT consulting NYC Administration Smartphones Upgrade Innovation Rental Service IT consulting Staten island Health IT Wireless data recovery Staten Island Communication Mobile Device Management Budget IT support Staten Islans Accidental deletion Displays Technology Tip of the Week Digital Payment Phishing Content HTML Customer Service Electronic Medical Records IT Management Regulation Security Cameras Server Computer Care Writing staten island managed services Data storage SaaS Time Management computer support Staten Island Users Paperless Office Data Management Notifications Unified Threat Management Nanotechnology Google Maps Taxes Google Calendar Telephone Information Unified Communications Streaming Media Hacker computer services Staten Island Download Worker Cost Management Supercomputer Knowledge Blockchain Comparison IT consulting firms 3D Printing Antivirus Reliable Computing Hiring/Firing Upload Monitors Screen Reader Computing Data Security Experience Government Tablet Hacks Healthcare BYOD Excel computer repair Directions Business Backup and Disaster Recovery Network Security IT Services Vendor Virtual Reality Analytics Best Practices Advertising Windows XP Emergency IT support Privacy IT services Staten Island Tech Support Apple Voice over Internet Protocol User Tip Law Enforcement Language Bitcoin Staten Island tech support Automation Password Tip of the week end-user files Websites Virtual Desktop Outsourced IT Database Cloud computing Staten Island managed it services Word Settings tech support Staten Island Google Docs Productivity IT Support Spam Hardware Solutions managed IT services NYC malware worms Relocation Twitter Employer Employee Relationship VoIP Work/Life Balance Social Network datto Society Domains Motion Sickness Saving Time Smartphone Specifications Conferencing Software as a Service Access Lithium-ion battery Username Workstations Tactics Tablets Staten Island IT support Chromebook Black Market iPhone Cybersecurity Internet managed services Staten Island Professional Services Vendor Management Evernote Multi-Factor Security Legal Medical IT Wi-Fi Mobile Security Applications Document Management Securty Email Workplace Tips Augmented Reality Office Social End of Support Telephone System Save Money IT services New York City Wireless Headphones Flexibility Machine Learning Cleaning Managed IT Services Hacking Navigation Redundancy PDF Cabling Operating System Router Gamification IT support Staten Island Public Cloud IT consulting company Passwords Telephone Systems managed services Downtime Maintenance Project Management today ’s organizations Training Business Technology Workers Text Messaging Equifax Hardware Downloads Microsoft Excel Legislation Data Device security Software License Virtualization Webcam Cooperation Monitoring Windows Bandwidth Mobile Device Alert Meetings Uninterrupted Power Supply Processors News

Newsletter Sign Up