ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Upgrade Microsoft Office Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Disaster Recovery Covid-19 IT Support Managed Service Browser Windows 10 Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Internet of Things Remote Work Saving Money Operating System Government Networking Workplace Strategy Windows Gadgets Artificial Intelligence Managed IT services Information Business Technology WiFi App Virtualization Mobile Device Management Spam Server Blockchain Bandwidth Remote Encryption Gmail Budget Office Two-factor Authentication Office 365 Apple History Information Technology Employee/Employer Relationship Wi-Fi Big Data Access Control Data Security Health Conferencing Cybercrime BDR Analytics Save Money Remote Computing IT Management Vendor Help Desk Training Voice over Internet Protocol Hacking Cost Management Hacker Patch Management Employer-Employee Relationship Document Management Remote Monitoring Compliance IBM Outlook Website Password Applications BYOD Vulnerabilities Mobile Office Computing Managed Services Vendor Management Hard Drive Search... Money Best Practice Data loss Customer Service Unified Threat Management Firewall Retail Legal Alert Project Management Data storage Augmented Reality Word Hiring/Firing Travel Mobility Data Breach Meetings Virtual Reality Social Engineering Router Cryptocurrency Black Market Chrome Google Maps Cleaning Scam The Internet of Things Robot YouTube Remote Workers Monitoring Windows 11 Windows 7 VPN Free Resource Mobile Computing Healthcare Laptop Update Marketing How To Running Cable Twitter Storage Paperless Office Law Enforcement Sports Antivirus Social End of Support SaaS DDoS Maintenance Printer iPhone Education Cortana User Websites Content Filtering Video Conferencing Bluetooth Vulnerability Distributed Denial of Service Office Tips Software as a Service Virtual Machines Processors Computer Repair Data Protection Private Cloud Processor Memory Professional Services Politics PowerPoint Machine Learning Settings Multi-factor Authentication Managed Services Provider Administration Tech Terms Wireless Technology Virtual Private Network Presentation Solid State Drive Specifications eWaste Saving Time Managed IT IT Consultant Digital Current Events Chromebook Drones Downtime Solutions Customer Relationship Management Computers Safety Bitcoin Taxes Automobile Co-Managed IT Telephone Entertainment Integration Virtual Desktop Images 101 Experience Display How To Microchip Excel Flexibility Physical Security Employees Avoiding Downtime Disaster Hack Identity Theft Notifications Holidays Virtual Assistant Start Menu HIPAA Unified Communications Downloads Computer Care Cooperation Google Docs Lithium-ion battery Uninterrupted Power Supply Entrepreneur Teamwork Webcam LiFi 2FA Database Music Documents Data Storage Business Mangement Workplace Strategies Application Hypervisor Business Owner Business Intelligence Medical IT Health IT Shopping Equifax Tablets Hard Drive Disposal SQL Server Paperless Tactics Username Google Calendar Securty PCI DSS Licensing Supercomputer Botnet Rental Service Micrsooft Gig Economy Startup Virus Domains Humor Freedom of Information Internet Service Provider email scam Azure Motion Sickness Navigation Flash Business Communications Addiction Telephone Systems Comparison Business Growth Regulations Compliance Mobile Security Google Drive Smart Technology Managed IT Service Inbound Marketing User Tip Legislation Memes News Net Neutrality Corporate Profile Evernote Human Resources Network Management Knowledge Banking Television Google Wallet Financial Data Telephony Public Speaking Employer Employee Relationship Messenger Proxy Server Deep Learning Streaming Media Risk Management Emails IT Fake News Electronic Payment Cabling Computing Infrastructure Tablet Keyboard G Suite Google Apps Service Level Agreement Business Metrics Management Mouse Hosted Solution Telework Device security VoIP Supply Chain Hard Drives Tracking intranet Microsoft 365 Phone System Books Smartwatch Wireless Headphones Communitications Microsoft Excel Society Wireless Procurement Business Cards Shortcut Web Server Tech Language Going Green Error SharePoint FinTech Workplace Heating/Cooling Digital Payment Environment Worker Social Networking Reading Bookmark Monitors Windows XP CES Visible Light Communication IT Assessment Download Windows 8 Supply Chain Management Piracy Access Value Term Computer Accessories Organization HTML Time Management Scams Cyber security Public Cloud Relocation Browsers Displays Nanotechnology Advertising Smart Devices Upload Audit Tech Support Remote Working Software License Spyware Google Play Work/Life Balance Social Network AI Cables Trend Micro File Sharing Transportation Data Analysis Digital Security Cameras Screen Reader Redundancy Electronic Health Records Trends Staffing Mobile Technology Cache Wasting Time In Internet of Things Security Cameras Hacks Customer Resource management Network Congestion Devices Unified Threat Management Point of Sale IP Address eCommerce Workers Modem Surveillance Tip of the week Reliable Computing Fileless Malware Writing Videos Gamification Printing Company Culture Shortcuts Managing Costs Troubleshooting CCTV SSID Telephone System Regulations Touchscreen Development Employer/Employee Relationships Computer Malfunction Scalability Directions Media Backup and Disaster Recovery Emergency Content Proactive IT Recovery Desktop Vendor Mangement Be Proactive Competition Virtual Machine Administrator Text Messaging Bring Your Own Device Electronic Medical Records Reviews Accountants Optimization Samsung

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?