Keep out of danger from piracy

Similar documents
How to protect yourself. against piracy

Microsoft Licensing in Five Easy Steps

Overview and How to Use This Guide

Microsoft OEM System Builder. Licensing Guide

MICROSOFT OEM SYSTEM BUILDER. Genuine Microsoft Software & Licensing Guide

Software Licensing and Compliance Guide

Cloud Storage vs Physical Media What you need to know!

A Guide to Software Asset Management

Your SOS Survival Guide for Software Audits

A Guide to Software Asset Management

Packaged Unified Communications Solution. The all-in-one integrated collaboration solution that s simple, scalable and affordable.

Version: 2.0. Effective From: 28/11/2014

SOFTWARE LICENSING THE RIGHT ADVICE & THE RIGHT CHOICE INSIDE THIS ISSUE WE HAVE IT COVERED. Advice from Equanet

Global Headquarters: 5 Speen Street Framingham, MA USA P F

2.Business Advisor Series

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Microsoft Licensing made simple

Virus Protection for Small to Medium Networks

Timing Your Migration To Windows 7. Is Microsoft forcing your hand?

УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE. Evgeny DANILOV. Microsoft Central and Eastern Europe Multi-Country New Markets

Eight Rock Solid Reasons Why You Should Buy OEM From Us

How to Keep Your Computer Network Up, Running, and Problem FREE

Lowering the costs of administering your IT infrastructure

Software Smart Buying Lower cost, better insight

ISACA Kampala Chapter Feb Bernard Wanyama Syntech Associates Limited

Upgrade from Windows 7 or 8.1. January 29, 2016

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

Active Threat Control

PayPoint.net Gateway Guide to Identifying Fraud Risks

EMMANUEL CE VA MIDDLE SCHOOL. IT Security Standards

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

An Insiders Guide To Choosing An Honest, Reliable And Competent Computer Support Company

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

A Guide to Information Technology Security in Trinity College Dublin

WhitePaper THIN CLIENTS

Guideline on Safe BYOD Management

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe

MONMOUTHSHIRE COUNTY COUNCIL DATA PROTECTION POLICY

Dr Web Mobile Security Licensing

INFORMATION SECURITY POLICY

So the security measures you put in place should seek to ensure that:

Chapter 15: Computer Security and Privacy

CONTENTS. Abstract Need for Desktop Management What should typical Desktop Management Software do? Securing Desktops...

Volume Licensing Product Terms Explained

SECURITY IN OPERATING SYSTEM VIRTUALISATION

What to consider before taking the leap... Claranet white paper. SaaS. PaaS. IaaS. Steps to the cloud. SaaS. PaaS. IaaS. SaaS.

University of South Wales Software Policies

A Sales Strategy to Increase Function Bookings

Grow Your Business by Building Customer Trust

Microsoft Open License

The Ultimate Windows 10 FAQ Page Compiled by

Software Asset Management Guide

Here are several tips to help you navigate Fairfax County s legal system.

10 Hidden IT Risks That Might Threaten Your Law Firm

Malware isn t The only Threat on Your Endpoints

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

HOW TO GET THE MOST OUT OF YOUR ACCOUNTANT

TOP QUESTIONS ABOUT MICROSOFT AUDITS

What you can do prevent virus infections on your computer

Product Capability Whitepaper. Is Software Compliance A Concern to You?

Nine Steps to Smart Security for Small Businesses

fmswhitepaper Why community-based financial institutions should practice enterprise risk management.

BPI (BRITISH RECORDED MUSIC INDUSTRY) LIMITED

ENTELEC 2002 SCADA SYSTEM PERIODIC MAINTENANCE

10 Hidden IT Risks That Threaten Your Financial Services Firm

Protecting personally identifiable information: What data is at risk and what you can do about it

Desktop and Laptop Security Policy

The Economics of. Software as a Service (SaaS) VS. Software as a Product. By Scott Sehlhorst

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

Managed Service Plans

Reducing Cyber Risk in Your Organization

Why you MUST protect your customer data

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A VIRTUAL PRIVATE SERVER. Version date

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Microsoft Security Essentials Installation and Configuration Guide

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Third Party Security Requirements Policy

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

BUYER S GUIDE. The Unified Communications Buyer s Guide: Four Steps to Prepare for the Modern, Mobile Workforce

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

Addressing Global Software Piracy

Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users

Patch Management. Rich Bowen

WhitePaper. Private Cloud Computing Essentials

Managing Security Risks in Modern IT Networks

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Information Security Services

SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland

Desktop as a Service (DaaS): A Solution for Modern Agencies

Shelter Pro Installation Guide. Overview. Database backups. Shelter Pro Installation Guide Page 1

NCR APTRA Suite. The world s leading financial self-service software portfolio

Minimize the Costs of Server Ownership and Gain Peace of Mind

MICROSOFT ROADMAP THE NEW OFFICE & WINDOWS 8

Ezi Managed Services Pty Ltd Introduction to Our Managed Service Agreement

Check Point and Security Best Practices. December 2013 Presented by David Rawle

UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY

Microsoft Rental Rights Licensing

How to Use Solo Ads to. Grow Your Business

Transcription:

Keep out of danger from piracy

Piracy hurts everybody - especially businesses that rely on dependable IT to survive. Most businesses don t intend to use illegal software or break the terms of their license agreements but, often as a result of bad planning, inadequate IT policies, or simply a lack of awareness, many end up doing so. This leaflet will help you to understand how piracy can happen and how to identify any software threats you may have. It will also help you learn how software asset management practices can help protect your business in the future. JOIN THE FIGHT AGAINST PIRACY A recent report published by the Business Software Alliance (BSA) found that reducing the UK piracy rate by just 10 percentage points would stimulate 5.4bn in new economic activity and create over 13,000 new jobs and 1.5bn in tax revenues. Everyone can join the fight against piracy by reporting the software pirates. If you have spotted an act of piracy you can report it at

How piracy happens key software piracy scenarios Software piracy can occur in many ways and, though most often associated with counterfeit software that has been copied or stolen, mis-licensing and mis-versioning are equally serious and widespread forms of piracy. Below is a brief description of the different types of piracy. Know your licensing A software product licence grants you the legal right to run or access a software program. In other words, you don t actually own your software you own the licence to run that software. A licence agreement, such as Microsoft Software Licence Terms also known as the End User Licence Agreement, or EULA governs the use of licenced software. Licence agreements typically allow the software to run on a limited number of computers and allow copies to be made (though solely for backup purposes). Mis-licensing If you do not have a licence for your software, have the wrong licence or not enough licences then you could be committing piracy. It s important that you understand and abide by the user rights of the licences you own. Examples of mis-licensing include: Installing a single licence on multiple machines Installing a single licence on a server to which multiple users or devices have access Purchasing PCs without an OS preinstalled or with LINUX, freedoms or other OS installed, then using a Microsoft Volume Licensing (VL) Agreement to install the full Windows desktop* Mis-versioning If you have the right quantity of licences but for the wrong edition or version of a software product, you could be committing piracy. Examples of mis-versioning include: Purchasing licences via a VL Agreement for a standard edition but then downloading a pro edition version of a software product Using a VL Agreement to upgrade Windows** Using a software application in a way that is prohibited by its licence, for example when a Home or Student edition is deployed in a commercial environment * Please refer to the Windows licensing basics for more information on how to correctly licence Windows. Visit microsoftvolumelicensing.com/userights ** For a list of products that qualify as Windows base licences, please refer to microsoftvolumelicensing.com/userights

Counterfeiting and Hard Disk Loading If you have deliberately or unintentionally purchased illegally copied software then you are committing piracy. Examples of counterfeiting and hard disk loading include: Installing software using product keys you do not own to illegally activate a product Replacing a motherboard on a machine without obtaining a new Windows base licence Downloading Microsoft software from an unauthorised peer-to-peer sharing site or other sites not authorised by Microsoft Installing software using counterfeit media Key fact The quality of today s counterfeit software varies enormously from amateurish copies to superior examples that are very similar to the genuine article. Stay on the lookout for every type of counterfeit software and follow our How to tell advice both in this leaflet and online at www.microsoft.com/uk howtotell The risks of counterfeit know the facts Counterfeit software can lead to data loss, identity theft and costly downtime. Simply put, counterfeit software is risky whether you find it on the street, on the Internet, or at a low-price retail outlet that seems legitimate. In an IDC study, 25 per cent of websites studied that offered counterfeit or pirated software also attempted to install spyware or Trojans that can compromise your systems and require costly solutions to fix. A Yankee Group study revealed, When problems arise with counterfeit software, IT administrators typically require 20 per cent to 30 per cent more time and labour to identify and resolve the problems at a monetary premium to the business. In studies conducted on counterfeit versions of Microsoft software, one in three disks could not be installed on a computer. More than 40 per cent of the remaining counterfeit disks installed contained additional programs or binaries with known vulnerabilities. Counterfeit software can be tempting. But weigh up the risks, and you ll see it s definitely no bargain. The perceived savings of using pirated software can be wiped out in a single security breach or critical incident resulting in downtime and other expensive remedies. Don t risk it. Get the features, security and support you deserve with genuine Microsoft software. How to tell If you want to assess whether a Microsoft product is genuine or not, there are a couple of quick checks you can carry out: Check the holographic coating on the media CD pick at the edges of the hologram to see if you can peel it off like a sticker. If you can, you probably have a non-genuine copy in your possession. Look at the certificate of authenticity (COA) sticker, either on the software s box or attached to the PC/laptop. If the hole in the sticker is cutout with clean lines, you may have a non-genuine copy. The hole in the COA should always be threaded, with the paper fibres on show.

When to think about piracy Although protecting your business from piracy should always be considered a priority, there are times when organisations are at a higher risk. If your company encounters one of the following scenarios, it is sensible to take extra care and if in doubt seek further advice. Hiring more staff As many businesses have experienced, hiring new staff is a crucial time to assess the software licensing requirements. Obvious assets such as company cars, PCs and mobile phones are monitored but it s important to ensure your software licensing isn t overlooked as your company grows. Mergers and acquisitions If your organisation has been or is about to go through a merger or acquisition it s a good time to review your software assets. Especially as it s likely your software licensing requirements will have changed. Buying online Buying software online is fairly commonplace these days and software pirates have taken advantage of this. Online, illegal software is harder to spot and often the sites that software pirates set-up look professional. Extra vigilance is required when buying software online and it s important to carry out the following checks before placing any order: Is the price similar to that of a well-known retailer? A price that seems too good to be true often is. Also be aware that superior quality counterfeit software is sometimes close in price to the real thing so extra care must be taken. If it s a new company you are using, what details about their organisation do they provide? Are there any contact details such as a phone number or registered address you can use? A tell-tale sign of a questionable seller is when there isn t a direct way of contacting them after they have made a sale. Is the company based in your country? Fraudsters often operate across country borders to reduce traceability and avoid taxes. Ensure you know where the company is based before placing an order. Implementing a new solution & renewals It s fairly commonplace for organisations to review IT solutions on a regular basis, renew an existing solution or introduce new ones. All are a sensible time to review your current software licence entitlement and assess your ongoing licensing requirements. Ensure your IT solution Partner is aware of your needs at this time. Work with an IT expert It goes without saying that you should always work with a reputable and trustworthy IT provider. Microsoft Partners are IT experts who meet strict quality and experience standards. They are capable of expertly examining your business needs and recommending solutions that deliver measurable benefits no matter what size of business you have.

Software Asset Management (SAM) Realising the full value of your software investment It s all too easy to put off reviewing your software estate but software licences are assets and investments and should be managed as such. SAM helps you control costs and optimise these investments as your organisation evolves. It s easy to implement a basic SAM practice within your organisation, you can refer to the Microsoft SAM guide at www.microsoft.com/uk/sam Alternatively, if you would like help with a SAM implementation, contact us to discuss your software requirements. SAM can help you: Save Money Good software Management can help you determine what software you do and don t need allowing you to establish how to deploy software more efficiently across your organisation. Plan for future technology investments Software Management can help you identify your organisations software needs and ensure that the technology you have meets the needs of your business. Establish the best licensing solution for your organisation By understanding your software licensing requirements you can take advantage of volume licensing discounts offered by Microsoft and other software vendors. Find out more There are many resources to help you learn more about how piracy happens and what you can do to join the fight against piracy. Find out more at