Feeds

Hampshire cops caught using counterfeit MS software

MS and reseller use installation as case study

  • alert
  • submit to reddit

The essential guide to IT transformation

Updated Microsoft has set the law on the coppers of Hampshire after it discovered the force was using counterfeit copies of Microsoft Office Pro 97.

Officers from the City of London arrested four men yesterday in connection with the crime, reports The Sun. Three of the men work for Protocol Solutions, the integrators who set up the Hampshire force's IT system. The fourth man was an ex-employee of Protocol.

One of the men arrested was a former superintendent of Hampshire. All four have been released without charge.

The police also raided Protocol's offices in Fareham.

According to a Microsoft case study Hampshire Constabulary's system comprises '2,000 desktop personal computers running on 40 Windows NT Server-based server machines.'

The volume price for the Open License Pack of Microsoft Office Professional 97, according to MS' web site, is $412.00.

City of London cops were brought in as independent investigators and because of their expertise in complicated fraud crimes.

Happily Protocol has also used the Hampshire Constabulary deal as a case study. The site doesn't seem to be working that well but the company seems a bit busy trying to compile an official statement about the situation.

Protocol is a Microsoft Certified Solutions Partner, as well as a reseller of IBM, Compaq, Citrix and Sun kit.

The Microsoft case study has quotes "David Walker, IT Project Manager for Hampshire Constabulary, explaining the value of Microsoft Systems Management Server."

"Firstly it performs a regular hardware and software audit of systems connected to the network." It also allows "the management of application licenses, through which savings can be made..." Good stuff that Microsoft SMS.

On a happy note the Hampshire force may be elligible for full authorised versions of the software via Microsoft's latest anti-piracy initiative. This allows resellers and punters to send in their dodgy disks, along with receipts, and then provide full information on how they got the software. They then hope for the merciful Microsoft to rule they've been genuinely stitched up and so deserve replacement CDs. ®

Related Links

Microsoft's case study
Protocol's case study

Related Stories

Insiders help Windows code leak to warez sites, claims 'finder'
Make MS happy: send in your hooky software
Swap your fakes for genuwine software

Boost IT visibility and business value

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Ballmer leaves Microsoft board to spend more time with his b-balls
From Clippy to Clippers: Hi, I see you're running an NBA team now ...
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Broadband slow and expensive? Blame Telstra says CloudFlare
Won't peer, will gouge for Internet transit
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?