Feeds

Law firm urges caution over BSA piracy forms

Not as serious as tax return

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

A major corporate law firm is advising UK companies which receive a software audit form from the Business Software Alliance to "Proceed with Care!" when deciding whether to complete it.

According to DLA, anyone who returns the form in good faith "could simply be providing the BSA with the evidence it needs to take action against you".

The BSA strongly denies that it has any such purpose in mind. Mike Newton, campaign relation manager, says the information collected from the software audit is for database purposes only. "It will not be used for lead generation purposes."

The BSA recently sent all UK organisations with 20 or more employees a "2001 Software Audit Return". It has a deadline of 30 November for responses and includes a notice to treat the document, "as seriously as a tax return".

The organisation is not legally allowed to pass on the information, however damning it may be, to its member companies (Microsoft, Symantec, etc.), as this contravenes the Data Protection Act, and it is the member companies that hold the key to further legal action, not the BSA, Newton says.

DLA, in a newsletter to its clients, says the approach taken by the BSA makes the document look like an official, even statutory, process which companies are required to comply with. But the BSA has no power to force companies to complete the form, being a private body, not a regulatory one.

The BSA agrees; it does not have the power of attorney needed to make companies fill in the forms, and this fact is clarified on the Q&A form sent out with the audit request, Newton says.

The purpose of the audit is simply an educational measure intended to remind companies that they should use legal software, according to the BSA pitch. One in four companies in the UK use illegal software and it is the BSA's intention to assist these companies in understanding the dangers of doing this and assist them in finding a path to legality.

It is currently investigating more than 500 companies in the UK and receives over 40 leads a week from individuals. ®

Related Stories

BSA stomps Warez.at
BSA sues five UK businesses for software piracy

Related Links

BSA UK Home Page
DLA Solicitors
BSA's Software Audit Programme

Next gen security for virtualised datacentres

More from The Register

next story
Why has the web gone to hell? Market chaos and HUMAN NATURE
Tim Berners-Lee isn't happy, but we should be
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Eat up Martha! Microsoft slings handwriting recog into OneNote on Android
Freehand input on non-Windows kit for the first time
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
(Not so) Instagram now: Time-shifting Hyperlapse iPhone tool unleashed
Photos app now able to shoot fast-moving videos
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.