Feeds

Microsoft takes UK TV soap offensive

Deirdre, Beal, Ken could help counter organised crime

  • alert
  • submit to reddit

Seven Steps to Software Security

In a bid to stamp out piracy of its operating and application software piracy, Microsoft UK is hoping to persuade TV companies to include its message in popular soap operas. Julie Philpot, anti-piracy manager at Microsoft UK, revealed the plans at a meeting of the Personal Computer Association in Elstree last night. Philpott explained to the audience of system builders, distributors and PC companies that using pirated software not only cost Microsoft revenues but put money into the pockets of organised crime syndicates. Stealing software was not a trivial matter, she said, with organised crime choosing to counterfeit branded Microsoft markets rather than sell cocaine or heroin. Criminal gangs would rather make money from doing that than face the kind of prison sentences drug dealing attracted. For these reasons, Microsoft would try and re-inforce its anti-piracy message by getting popular TV soaps to include warnings in episodes of their programmes. She refused to be drawn on whether Microsoft was targeting Coronation Street, Eastenders, Brookside or Emmerdale. Philpott faced a lively debate after members of the trade association, faced with declining margins on PCs, asked her whether Microsoft could not publish recommended retail prices on its software so that they could have a better idea of whether products they were offered were grey market or possibly counterfeit products. Buying official product through established Microsoft channels sometimes meant that the software, particularly at the low end of the market, cost more than the entire system box. Philpott introduced a scheme for PCA members which would allow them to call a special 0800 free phone hotline to report possible distribution of pirated software. The scheme is intended to streamline the process of investigation, seizures and possible prosecutions. ®

Boost IT visibility and business value

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.