ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the Business Software Alliance Will Come After Your Business

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

First off, we want to make it clear that we don’t condone software piracy or the use of pirated software. Having said this, we also can’t--in good conscience--condone the strategies used by those who fight software piracy, either. A prime example is the track record of BSA | The Software Alliance.

Who We are Dealing With
BSA is the title of an international advocacy group that fights for the proper licensing of software solutions meant for business purposes. Members of this group include many well-known faces, including IBM, Adobe, Trend Micro, Apple, and Microsoft. According to the organization’s website, BSA “pioneers compliance programs that promote legal software use and advocates for public policies that foster technology innovation and drive growth in the digital economy.”

Admittedly, this mission seems perfectly fine, even admirable, at first glance. However, BSA undermines their mission statement through the tactics they have been known to use to accomplish their less-publicized, primary goal: stomping out pirated software by any means necessary, while making any business that possesses unlicensed software pay a hefty, hefty fine.

Using Social Media to Bribe Their Target Audience
BSA targets businesses that are “under suspicion” of using unlicensed software. However, for them to do so, there needs to be a reason to suspect these businesses in the first place.

To get this “probable cause,” of sorts, BSA has historically turned to social media. Using the marketing platforms supplied by the social media sites, BSA once directly targeted their audience, promising a cash bounty to those who turned over a business that used pirated software. There is even a Facebook page devoted to this campaign that seems to have been abandoned, but still provides evidence that BSA was speaking to a very specific audience: the employees of the businesses that BSA was after.
After all, who would know better than an employee whether or not a business was using a piece of software with less-than-legitimate origins?

The trajectory of these campaigns has gone from blatant to subliminal, as BSA started off by running advertisements that encouraged an employee to “Nail your boss. Report Software Piracy.” More recently, BSA has used more targeted social media efforts to focus in on employees like yours, encouraging them to turn you in for your assumed software piracy in exchange for a cash bounty. These bounties are scaled to the amount in damages that the reported company pays BSA according to their settlement.

If someone were to blow the whistle on a company and the settlement came out to something between $15,000 to $100,000, they could receive a bounty of up to $5,000. However, if the company in question was on the hook for $15,000,000 or more, the whistleblower could see as much as $1,000,000 coming their way.

The thing is, according to BSA, the organization “reserves the right to deviate from that schedule in its sole discretion.” This means that, even if someone blew the whistle and reported a company that had to pay well over $15,000,000, BSA could decide to collect that money and stiff the whistleblower.

Why This Should Be Worrisome to You
If you’re the one responsible for the pirated software being on the system, you’re the one who is going to be held responsible. However, if one of your employees is responsible for pirated software being on the system, guess who is considered responsible then?

Still you.

This is still the case if an employee uses the same software license on numerous devices within your business. What’s worse, if an employee who had done such things was ever to leave with a grudge, they could still be the one to report you.

So, if Pete ran a company, and Paul ran his IT, Pete would be the one that the BSA would go after if Paul installed pirated software on his network. In fact, if Pete was fined $25,000, Paul could expect a payout of a couple thousand dollars for an issue that he himself was responsible for causing.

Solving this Problem
First and foremost, you need to make sure that your network is completely free of unlicensed software. The way to achieve this is to run a comprehensive audit to identify and eliminate the kind of software that would interest BSA. As a result, even if BSA reached out, you could confidently welcome them in knowing that you wouldn’t be tripped up by something an employee did, either with malice or unintentionally.

For help with this audit and the removal of any unlicensed software there may be on your network, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Covid-19 Holiday Disaster Recovery IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Workplace Strategy Managed IT services Gadgets Networking Windows App Business Technology Virtualization Blockchain Spam WiFi Remote Server Information Bandwidth Encryption Mobile Device Management Office Apple Two-factor Authentication Office 365 Information Technology Employee/Employer Relationship Budget History Gmail Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Help Desk Hacking Cost Management IT Management Remote Computing Training Hacker Document Management Save Money Patch Management Compliance Vendor Voice over Internet Protocol Remote Monitoring Employer-Employee Relationship Alert Vendor Management Hard Drive Hiring/Firing Outlook Data loss Password Legal Money Data storage Customer Service Unified Threat Management Firewall Augmented Reality Applications Word Search... Mobile Office Best Practice IBM Project Management BYOD Vulnerabilities Website Managed Services Retail Computing How To The Internet of Things Mobility Meetings YouTube User Google Maps Twitter Scam Laptop Law Enforcement End of Support Printer Chrome VPN Update Sports Social SaaS DDoS Travel Mobile Computing Windows 11 Virtual Reality Data Breach Social Engineering Marketing Cryptocurrency Paperless Office Antivirus iPhone Black Market Running Cable Education Cortana Maintenance Remote Workers Cleaning Content Filtering Robot Storage Windows 7 Free Resource Monitoring Router Healthcare Websites Vulnerability Saving Time Solutions Drones Chromebook Software as a Service HIPAA Data Protection Computers Bitcoin Automobile Images 101 Integration Display Telephone Wireless Technology How To eWaste Microchip Flexibility Employees Excel Downtime Avoiding Downtime Safety Tech Terms Holidays Hack Identity Theft Virtual Desktop Notifications Managed IT PowerPoint Experience Digital Unified Communications Virtual Assistant Cooperation Administration Video Conferencing Google Docs Presentation Bluetooth Virtual Machines Taxes Specifications Distributed Denial of Service Computer Repair Office Tips IT Consultant Disaster Private Cloud Processor Memory Professional Services Customer Relationship Management Co-Managed IT Physical Security Entertainment Lithium-ion battery Managed Services Provider Politics Machine Learning Settings Virtual Private Network Multi-factor Authentication Start Menu Processors Solid State Drive Downloads Computer Care Current Events Books FinTech Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Troubleshooting Tech CES Language Business Mangement Going Green IT Assessment Society Business Cards Point of Sale Tablets Value Error Supply Chain Management Reading Bookmark Organization Monitors Cyber security Visible Light Communication Shortcuts Google Calendar Term Public Speaking Download Smart Devices Windows 8 Supercomputer Piracy HTML Streaming Media Virus Remote Working Relocation Browsers AI Keyboard Displays Nanotechnology Trend Micro Advertising Motion Sickness Be Proactive Business Owner Comparison Google Play Digital Security Cameras Hard Drives Work/Life Balance Google Drive Upload Electronic Health Records Tech Support Software License Transportation intranet Wasting Time Social Network Wireless Knowledge Data Analysis Shortcut Corporate Profile Screen Reader eCommerce Modem Workplace Strategies In Internet of Things Television Security Cameras Videos Heating/Cooling Telephony Trends Surveillance Environment Employer Employee Relationship Mobile Technology Social Networking Network Congestion Cabling Devices Managing Costs Windows XP Hacks Customer Resource management Reliable Computing Fileless Malware Writing Tablet G Suite Tip of the week SSID Inbound Marketing Mouse Media VoIP Gamification Development Tracking Company Culture Employer/Employee Relationships Regulations Virtual Machine Telephone System Scalability Directions Reviews Backup and Disaster Recovery Optimization Web Server Smart Technology Administrator SharePoint 2FA Text Messaging Content Proactive IT Digital Payment Desktop Teamwork Worker Accountants Hypervisor Electronic Payment Bring Your Own Device Electronic Medical Records Data Storage Staffing Shopping Access Database Medical IT Paperless IP Address Time Management Music Public Cloud SQL Server PCI DSS Equifax Licensing Phone System Health IT Audit Gig Economy Spyware Tactics Humor Hard Drive Disposal Supply Chain Azure Botnet Business Communications Username Internet Service Provider File Sharing Regulations Compliance Micrsooft Startup Managed IT Service Freedom of Information Rental Service Redundancy Recovery Navigation Competition Flash Cache Addiction Memes email scam Workplace Human Resources Computer Accessories Telephone Systems Unified Threat Management Net Neutrality Business Growth Workers Mobile Security Financial Data Entrepreneur Legislation News LiFi User Tip Documents Printing Evernote Risk Management Application Network Management IT CCTV Scams Google Apps Banking Touchscreen Business Intelligence Google Wallet Telework Deep Learning Emails Computer Malfunction Fake News Messenger Emergency Proxy Server Securty Smartwatch Vendor Mangement Service Level Agreement Communitications Computing Infrastructure Microsoft 365 Cables Domains Business Metrics Management Procurement Hosted Solution Samsung Device security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?