How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give Celera Networks a call at (617) 375-9100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Productivity Business Computing business Malware Microsoft Internet IT Services Backup Hosted Solutions Managed Service Provider IT Support Email Mobile Devices Workplace Tips Network Hardware Communication Computer Smartphones Microsoft Office Disaster Recovery Mobile Device Management network security Holiday Windows Miscellaneous Data Small Business Business Continuity Windows 10 Efficiency Alert Smartphone Google Server Software Upgrade Saving Money Business Management Internet of Things Virtualization User Tips Social Media WiFi Innovation Remote Monitoring Ransomware Remote Computing Operating System VoIP Big Data Android BYOD Gmail Cybersecurity Passwords The Internet of Things Mobile Computing Apps App Office Browser Vendor Management Apple Spam Artificial Intelligence Phishing Wireless Technology Collaboration Facebook Budget Business Growth Risk Management Analytics Hacking Information Technology Best Practice Data Management Save Money Tech Support Bring Your Own Device Going Green Office 365 Managed IT Services Cybercrime Customer Service Automation Gadgets Hacker Money Robot Cost Management Outsourced IT Office Tips IT Solutions Retail Managed IT Mobile Device Social Engineering Hosted Solution Laptop IT service Bitcoin communications Health Document Management Data storage Recovery Hard Drives Outlook Cortana Proactive IT Current Events Application intranet Avoiding Downtime Employer-Employee Relationship Presentation Firewall Content Filtering Downtime Lithium-ion Battery Running Cable Maintenance End of Support Computers Customer Relationship Management virus IT Consultant Saving Time Settings Education Analyitcs Bandwidth Network Congestion Programming Virtual Desktop Windows 8 IT Support Specifications Administration Disaster Productivity User Cryptocurrency Google Docs Phone System Piracy Quick Tips VPN Blockchain Chrome USB Two-factor Authentication Augmented Reality Vulnerabilities Hacks Work/Life Balance Company Culture PowerPoint Samsung Update Statistics Social Law Enforcement Password Antivirus Save Time iPhone Private Cloud LiFi Excel Cloud Computing Net Neutrality Hiring/Firing Tablet Business Owner Safety Data Security Competition Mouse Twitter Mobile Technology Encryption project management eWaste Search Marketing Humor Website Wireless Trending Data Breach Legal Notifications Monitors Data Recovery Patch Management Best Available News Files Flexibility Domains History Wi-Fi People Fiber-Optic Downloads Troubleshooting Typing Telephone Systems bdr Writing IT Plan Comparison Video Surveillance Fake News Websites Public Speaking 5G Business Intelligence Fraud data breaches Help Desk Google Drive Crowdsourcing Halloween Licensing Heating/Cooling Migration Television Microsoft Excel Botnet Managed IT Services today ’s world IBM Online Currency Managed Service Providers email scam risk Virtual Reality Cyber-attacks Government Scary Stories Business Technology experience downtime cyberattack SharePoint Sports Compliance Desktop Windows 8.1 Update Tip of the week Printer Documents Unified Communications Printing Digital Signature Fun Computing Infrastructure Travel cyberattacks Distributed Denial of Service Storage Regulations Crowdfunding Digital Printer Server Data loss PDF Paperless Office Computing Entrepreneur Vulnerability businesses Evernote Users Dark Data Gadget Buisness Refrigeration IP Address Virtual Assistant IT Management Co-managed IT Deep Learning Google Wallet Knowledge Networking Software as a Service Data Warehousing Politics CIO Mobile Office Hard Drive Public Cloud Google Calendar Drones Black Market Experience Business Cards Technology Tips Identity Theft Windows Server 2008 Telephony User Error Computer Repair Access Control Identities security breach Router Debate Software License Skype Windows 7 Training Consumers Undo Memory Hard Drive Disposal Solid State Drive Modern technology Backups Processors Display Word Redundancy Mobile Payment LinkedIn Mobility Freedom of Information File Sharing YouTube Touchscreen Unified Threat Management Environment Alt Codes business owners Web Server Supercomputer Hard Disk Drive Mobile Device Managment Cameras IT Budget CCTV Digital Payment G Suite Point of Sale Google Maps Machine Learning Corporate Profile Unified Threat Management SaaS Meetings Software Tips Relocation WannaCry Physical Security Webcam Applications Chromebook Motion Sickness GPS Data Backup How To Mobile Security Error Personal Information Emoji Cleaning Tracking Upgrades Electronic Medical Records Computer Care Cabling 3D Printing Automobile Staffing Infrastructure Unsupported Software test post Administrator Taxes Uninterrupted Power Supply Mobile Data Sync