ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

What’s a Software License?

We’re not lawyers, and we’re going to keep this in plain English. A software license is a contract that talks about the use or redistribution of a piece of software. It basically explains what you, the user, are allowed to do with the software and what your limitations are.

Think of software like any other medium, such as a novel, a song, a film, or a painting. If a novel is copywritten, it’s illegal to make copies and sell or otherwise distribute them. The publisher, whose job is to distribute and protect the author’s work, has every right to come after you for damages. The same goes for selling or publicly broadcasting someone’s music, or any other copywritten material. Software is no different - someone, or some entity, put a lot of time, money, and talent to build the software in order to distribute or sell it, and they have every right to control how that is done.

The software license grants limitations to the user as far as how many users can use the software. Although we don’t want to go too deep into all of the different rights and limitations that software licenses can have, there are some common categories most software falls into:

Public Domain

This software doesn’t have a copyright. It’s available for anyone to download, distribute, modify, and even sublicense out. This means you can take this software, change it however you want, and redistribute it. There aren’t a lot of famous examples of Public Domain software that we expect most of our readers to recognize, but one example is a portion of 7-Zip (a popular file compression tool) software is open and available for the world to use.

Free and Open Source

This software tends to be free, but “as a matter of liberty, not price.” The software could be free, or the developer could charge for it, but the license allows you to run the program however you want for any purpose, alter the software, redistribute the software, and distribute copies that you’ve modified. There are tons of famous examples, including the Linux operating system, the Firefox web browser, the software that Wikipedia is based on, and the Android operating system.

This type of license does a lot of good for the world, because it allows other developers to improve upon software (adding new features, customizations, or even making it safer) and make it available to the public.

Freeware/Shareware/Freemium

This category is for free (as in price) software. Unlike Free and Open Source software, however, the user doesn’t have the right to modify the software. Some famous examples of this type of software are Adobe PDF, WinZip, and the software for the game League of Legends.

Proprietary Licenses

Although you can’t really say this is the most common license for software, when it comes to commercial software, this is the license you usually run into. Proprietary software essentially means the copyright owner owns the software and you just have the right to use it. You can’t copy it, change it, or redistribute it in any way unless you get a specific license from the developer. Examples of this type of software are Microsoft Windows, macOS, Adobe Photoshop, and most commercial video games.

Trade Secret

Trade secret software tends to not be distributed the same way as most other software, and the portion of the software that is considered ‘trade secret’ doesn’t typically get installed on your device, or it’s installed on proprietary hardware that you don’t have a lot of control over. A lot of cloud-hosted software works this way. Think of the secret recipe for Coca-Cola, the inner workings of trade secret software is kept behind locked doors.

Why You Need to Audit Your Software Licenses

Your probably use a lot of software every day without thinking about it. You’ve got your workstation operating systems (typically Windows 10), your server operating systems, you likely use Microsoft Office or Adobe. Then there is your line of business app, your accounting/payroll software, inventory management, antivirus, your security camera software, software for your website, etc.

There are a lot of moving parts, and there are a lot of things to think about. For example, if a software license lapses, you might still be able to use that software, but you stop getting security updates and patches, which could leave you vulnerable.

It’s also critical to know your limitations with your software. For example, is the software restricted to the number of users it can use, or is it restricted to the number of devices it can be installed on? 

You Might Ask “Well How Will Anyone Know?”

You might think it doesn’t hurt anybody to share a piece of software that you purchased. You might pass over the installation files or let someone borrow the CD-ROM and think nothing of it. Unfortunately, this gesture could break your software license, and developers have several systems in place to identify it.

The Software Might ‘Phone Home’

Often, proprietary software will use the Internet to communicate to check for updates and check to validate the license. If it detects issues, it might deactivate the software or simply report back that something illegitimate is happening. 

The Software Might Require User Login

This method is becoming increasingly popular. If you log into the software on too many devices, it will deactivate on some of them based on the license. Basically, the software will prevent itself from being used across too many devices. 

Scary Whistleblower Programs

The arguably most nefarious solution that software developers have come up with is pitting your own employees or former employees against your business. The most famous (or infamous?) organization to come to mind is the Business Software Alliance (BSA). 

The BSA is an advocate for the software industry with a mission to help businesses protect the software they’ve developed. On the cover, it sounds like a good endeavor; after all, they strive to protect a business’ intellectual property. Unfortunately, they utilize some pretty sketchy tactics to do so.

The BSA has been known to market advertisements to people to encourage them to report their employer or former employer of misusing software licenses. The BSA even offers cash rewards and promises to keep the whistleblower anonymous. How do you feel about an organization targeting and bribing your employees to encourage them to report you? It’s just icky.

If your business gets reported, the BSA is relentless when it comes to sending cease and desists and forcing audits and threatening lawsuits. It’s just not a situation you want to find yourself in.

Don’t Risk It - Comply to Your Software Licenses

The first step is to audit all of the software you are using and get familiar with the software licenses. Document how many users and devices you can use it on, and what users and devices you are actually assigning the license to.

You’ll also want to document the purchase date of software, and if the software requires renewal, document that as well. Keep receipts and file them along with the rest of this documentation.

Any software that your company doesn’t need to operate should be uninstalled and removed from the network. It doesn’t hurt to make a list of exceptions too, for example, if you allow your employees to listen to music, allowing Spotify to be installed could be in your list of exceptions.

If you need assistance getting everything organized, the experts at ClearView IT can help. Give us a call at 866-326-7214 to talk about protecting your business from unexpected software license violations.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 06 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Mobile Device Management Spam WiFi Blockchain Server Bandwidth Encryption Information Remote App Virtualization Business Technology Office 365 Apple Information Technology History Gmail Employee/Employer Relationship Budget Office Two-factor Authentication Access Control Data Security Cybercrime Conferencing Health BDR Big Data Wi-Fi Analytics IT Management Training Voice over Internet Protocol Hacker Cost Management Compliance Patch Management Document Management Employer-Employee Relationship Save Money Remote Monitoring Help Desk Vendor Hacking Remote Computing Password Computing Vendor Management Mobile Office Hard Drive Money Managed Services Customer Service Unified Threat Management Firewall Data loss Legal Search... Augmented Reality Word Best Practice Data storage IBM Retail Website Project Management Alert Applications Hiring/Firing Outlook Vulnerabilities BYOD Monitoring Windows 11 Laptop Google Maps Healthcare Scam Chrome Remote Workers VPN Windows 7 Free Resource Twitter Update Sports Mobile Computing Social SaaS DDoS How To Law Enforcement Marketing End of Support Printer Running Cable iPhone Paperless Office Education Cortana Antivirus Storage Content Filtering Maintenance Travel Router Data Breach Virtual Reality Social Engineering Cryptocurrency Black Market The Internet of Things Websites Cleaning YouTube User Mobility Meetings Robot Multi-factor Authentication Wireless Technology eWaste Professional Services Solid State Drive Downtime Saving Time Safety Managed Services Provider Chromebook Drones PowerPoint Computers Bitcoin Tech Terms Administration Virtual Desktop Virtual Private Network Automobile Experience Telephone Presentation Managed IT Current Events Digital Specifications How To Microchip IT Consultant Flexibility Excel Solutions Taxes Disaster Customer Relationship Management Co-Managed IT Images 101 Integration Hack Display Identity Theft Entertainment Notifications Unified Communications Lithium-ion battery Virtual Assistant Physical Security Employees Google Docs Bluetooth Avoiding Downtime Distributed Denial of Service Processors Holidays Office Tips Memory Start Menu Processor Private Cloud Downloads Computer Care Cooperation HIPAA Video Conferencing Vulnerability Virtual Machines Politics Software as a Service Settings Data Protection Computer Repair Machine Learning PCI DSS Keyboard Google Calendar Licensing Banking Google Wallet Supercomputer Proxy Server Gig Economy Hard Drives Emails Humor Messenger Virus Fake News Deep Learning Computing Infrastructure Azure Motion Sickness Business Communications Service Level Agreement Internet Service Provider intranet Management Regulations Compliance Shortcut Comparison Supply Chain Device security Managed IT Service Business Metrics Google Drive Hosted Solution Wireless Heating/Cooling Wireless Headphones Memes Books Environment Microsoft Excel Business Cards Language Corporate Profile Inbound Marketing Society Windows XP Tech Human Resources Going Green Net Neutrality Social Networking Knowledge Error Financial Data Television Workplace Telephony Employer Employee Relationship Visible Light Communication Bookmark Risk Management IT Reading Monitors Cabling Piracy Tablet Windows 8 G Suite Term Google Apps Download Telework Mouse Scams HTML VoIP Electronic Payment Tracking Advertising Browsers Smartwatch Nanotechnology Communitications Relocation Microsoft 365 Displays Software License Work/Life Balance Tech Support Web Server Google Play Upload Procurement Staffing Social Network FinTech SharePoint Cables Digital Payment Phone System Worker Data Analysis CES IP Address Screen Reader IT Assessment In Internet of Things Mobile Technology Value Access Security Cameras Trends Supply Chain Management Customer Resource management Organization Point of Sale Devices Cyber security Hacks Time Management Network Congestion Public Cloud Writing Fileless Malware Smart Devices Reliable Computing Tip of the week Audit Shortcuts Company Culture Spyware Computer Accessories Gamification Remote Working Recovery Telephone System AI Competition Regulations Trend Micro File Sharing Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Scalability Redundancy Transportation Administrator Entrepreneur Be Proactive Desktop Wasting Time Text Messaging Cache Proactive IT LiFi Content Documents Electronic Medical Records Application Accountants eCommerce Bring Your Own Device Unified Threat Management Modem Workers Videos Database Surveillance Business Intelligence Printing Workplace Strategies Managing Costs Music CCTV Securty Health IT Equifax Touchscreen SSID Hard Drive Disposal Employer/Employee Relationships Troubleshooting Computer Malfunction Media Domains Tactics Development Emergency Username Botnet Virtual Machine Vendor Mangement Reviews Startup Optimization Rental Service Freedom of Information Micrsooft Samsung email scam Teamwork Flash Uninterrupted Power Supply Webcam Navigation 2FA Addiction Data Storage Smart Technology Mobile Security Hypervisor Telephone Systems Business Mangement Business Growth User Tip Shopping Public Speaking Legislation News Medical IT Tablets SQL Server Business Owner Streaming Media Evernote Paperless Network Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?