Feeds

Hampshire cops caught using counterfeit MS software

MS and reseller use installation as case study

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

Updated Microsoft has set the law on the coppers of Hampshire after it discovered the force was using counterfeit copies of Microsoft Office Pro 97.

Officers from the City of London arrested four men yesterday in connection with the crime, reports The Sun. Three of the men work for Protocol Solutions, the integrators who set up the Hampshire force's IT system. The fourth man was an ex-employee of Protocol.

One of the men arrested was a former superintendent of Hampshire. All four have been released without charge.

The police also raided Protocol's offices in Fareham.

According to a Microsoft case study Hampshire Constabulary's system comprises '2,000 desktop personal computers running on 40 Windows NT Server-based server machines.'

The volume price for the Open License Pack of Microsoft Office Professional 97, according to MS' web site, is $412.00.

City of London cops were brought in as independent investigators and because of their expertise in complicated fraud crimes.

Happily Protocol has also used the Hampshire Constabulary deal as a case study. The site doesn't seem to be working that well but the company seems a bit busy trying to compile an official statement about the situation.

Protocol is a Microsoft Certified Solutions Partner, as well as a reseller of IBM, Compaq, Citrix and Sun kit.

The Microsoft case study has quotes "David Walker, IT Project Manager for Hampshire Constabulary, explaining the value of Microsoft Systems Management Server."

"Firstly it performs a regular hardware and software audit of systems connected to the network." It also allows "the management of application licenses, through which savings can be made..." Good stuff that Microsoft SMS.

On a happy note the Hampshire force may be elligible for full authorised versions of the software via Microsoft's latest anti-piracy initiative. This allows resellers and punters to send in their dodgy disks, along with receipts, and then provide full information on how they got the software. They then hope for the merciful Microsoft to rule they've been genuinely stitched up and so deserve replacement CDs. ®

Related Links

Microsoft's case study
Protocol's case study

Related Stories

Insiders help Windows code leak to warez sites, claims 'finder'
Make MS happy: send in your hooky software
Swap your fakes for genuwine software

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Nadella: Apps must run on ALL WINDOWS – PCs, slabs and mobes
Phone egg, meet desktop chicken - your mother
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.