Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Tekie Geek a call at (347) 830-7322.

This Data Privacy Day, the NCSA Wants You to STOP....
Tip of the Week: Your Productivity Doesn’t Depend ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, November 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Disaster Recovery Gadgets Network Congestion Network Security Knowledge Tracking Blockchain Samsung SaaS Device security Monitors Regulations Employer-Employee Relationship Multi-Factor Security The Internet of Things Tablet Managed Service Provider Managed IT Services CryptoLocker Worker Hardware Audit Cabling Information Big Data Cybercrime Virtual Assistant computer repair Health IT Collaboration Users Alert Webcam Television Firewall Efficiency Network Bandwidth Money Entertainment Save Money Saving Money Printer IT consulting NYC Hackers Office Microsoft IT Services End of Support Staten Island tech support Bring Your Own Device Office Tips IT consulting Touchscreen Virus News Public Cloud IT Management Tech Term Music Software Tip of the Week Directions Relocation Computer Care Data Backup Managing Stress tech support Microsoft Office Data Security data loss Virtual Reality Update Vendor Management Analytics Recovery Customer Service IT support New York City Tip of the week IT support firms Bluetooth Business Computing Data Analysis Corporate Profile Private Cloud Society Robot Customer Resource management Small Business Password Internet of Things Management IT support Staten Islans Windows 10 Saving Time Start Menu Machine Learning Settings Hacker computer support NYC Law Enforcement Content Username IT support NYC Android Remote Computing Running Cable Hardware Solutions Cortana Windows 8 Gamification Server YouTube Telephony Hosted Solution 3D Printing Startup Vendor Mangement Cache Document Management IBM Emergency Hacking User Tip Bookmark Scalability Mouse Processor Windows XP Identity Theft today ’s organizations Laptops Devices Mobile Devices Writing Notifications Google Calendar Proxy Server Telephone IT Support computer support Reliable Computing Encryption Malware IT consulting firm Artificial Intelligence Help Desk Supercomputer Cleaning Streaming Media Scam Experience Browser Facebook Business Mangement Staffing Microchip Content Filtering Drones Legal Quick Tips Internet Memory Digital Payment datto Wireless Technology DDoS LiFi Regulation Google Wallet Paperless Office Computer Thank You PDF Congratulations Sports Technology Tablets Social Media Windows 10 Managed Service Staten Island IT consulting Social Network Navigation Project Management Gmail Administrator tech support Staten Island Virtualization Software License Windows managed services Staten Island Virtual Desktop Taxes data recovery Staten Island Physical Security User Tips Outsourced IT Spam Banking managed services BDR Securty Administration Training Distributed Denial of Service Error Microsoft Excel History Rental Service Wi-Fi IT Consultant Hard Drive Disposal Nanotechnology malware worms Workstations Best Practices Unified Threat Management Email Processors Browsers Digital Networking Employer Employee Relationship Social Business Technology Laptop Holiday managed IT services staten island Smartphones G Suite IT support Computing Infrastructure Office 365 Fake News Advertising Meetings Printers Google Docs Powerful Technology Solutions Phishing Search Maintenance Google Trends Workers it support Accidental deletion CCTV Workplace Tips Information Technology Privacy IT consulting company Travel Hard Drive Emails Tactics Text Messaging Tech Support managed it services Website Automobile Database Access Social Engineering Communication In Internet of Things Download Access Control Desktop Upgrade Managed IT Services eWaste Hosted Solutions Network Management Displays Hacks Productivity communications Business Metrics Cloud Specifications Downtime Business Comparison Data storage Vulnerability computer support Staten Island IT services NYC Mobile Device computer services Visible Light Communication Business Growth Smartphone Vendor Tech Terms Mobility Piracy VPN Business Management Lenovo Mobile Device Management computer repair Staten Island Remote Monitoring Domains VoIP Hiring/Firing Two-factor Authentication computer services Staten Island Accountants Excel How To Applications Backup Downloads data recovery Lithium-ion battery App Language Monitoring Cloud Computing malware Hard disk Websites IT consulting firms Google Drive Multi-factor Authentication IT support Staten Island Spyware computer support firms Bitcoin Black Market Data Breach Staten Island computer support Evernote Uninterrupted Power Supply VoIP Retail Twitter Redundancy Unified Threat Management Antivirus Disaster Patch Management Data Management Motion Sickness Computer Malfunction Documents Ransomware Solid State Drive Education Word Business Continuity WiFi SharePoint Apple Backup and Disaster Recovery Cryptocurrency Company Culture Screen Reader Work/Life Balance Automation IT services New York City Budget Wireless Conferencing Printing Software as a Service staten island managed services IT services Staten Island tech support Staten Isalnd Compliance Data Security Mobile Security Outlook Passwords Web Server Wireless Headphones Telephone System ransomware attacks Miscellaneous IT consulting Staten island Augmented Reality email scam Google Maps end-user files Equifax Going Green managed IT services NYC Apps Staten Island IT support Electronic Medical Records Computing Business Cards Upload Addiction Managed IT Operating System Freedom of Information Unified Communications Computers Legislation Time Management Mobile Technology CrashOverride Fileless Malware Flash HTML Politics Botnet Chromebook Cybersecurity Data Protection Best Practice Telephone Systems Health Vulnerabilities BYOD Deep Learning Safety Hack Government IT consulting Staten Island Cloud computing Staten Island Cost Management File Sharing Productivity Innovation Service Level Agreement Flexibility Proactive IT

Newsletter Sign Up