Feeds

Police fence stolen goods online

And the BSA acts as if it is the police

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Ever wonder why the police have the best drugs and hi-fi systems? Sorry, that is a completely false and libellous allegation and completely without foundation. However, there is the question of what happens to all the kit that the police inevitably end up with - the lost, found and stolen goods that no one ever claims.

Well, they are sold at police auctions. But then few people know where and when these take place and many more balk at the idea. Well, no more! Two e-commerce companies - eBay.co.uk, you know, and iForce - have persuaded 15 police forces throughout the UK to sign up to a new online auctioning system.

The system combines iForce's software and eBay's trading site. As they tell it, the new setup will benefit government, businesses, charities as well as average Joe. It will save the authorities the cost of collection, storage and delivery, increase the goods' sale price and benefit all those that buy em cheap. They've got a point too.

"The potential of the web to revolutionise traditional approaches has been somewhat forgotten in recent months as the dotcom gloom has been peddled. This announcement shows that there are still many new areas where e-commerce solutions have huge potential to re-engineer inefficient business and organisational processes," said Matthew Peacock, group chief executive of iForce. Now that's what we like to hear - optimism.

It works like this: iForce does the collection and delivery, cataloguing, stock management and warehousing. The goods are then sold on eBay.co.uk. Stuff catalogued so far includes sports clothes, CDs, computers, DVD players and jewellery. The service will be up and running the first of December (just over a week's time).

On the other side of the coin: while the police enter the commercial IT world, the crazed bunch at BSA (Business Software Alliance) seem to think they can become the police. They can't of course but that hasn't stop them sending out official looking audit forms to hundreds of companies.

In them you are asked to go round the office and justify possession of your software. And god help you if you haven't got the certificates. Note that the BSA doesn't actually say you have to fill it in - because you don't - but it goes as far as it can. And if you don't? Well don't come running to us when you find a toothless watchdog sucking on your leg.

Oh, and the deadline was yesterday. ®

Related Stories

BSA deploys imaginary pirate software detector vans

Security for virtualized datacentres

More from The Register

next story
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.