Feeds

Bust PC builder lands ICM with huge piracy bill

MS comes calling

  • alert
  • submit to reddit

ICM Computer Group has been landed with a huge bill for buying pirated software unwittingly from an unnamed distributor.

The disaster recovery specialist has set aside £725,000 to cover its obligations to Microsoft, of which £400,000 has already made its way to the software giant.

In a statement accompanying its results yesterday, ICM said it had bought the counterfeit software as part of a routine hardware and software supply agreement from a "large PC manufacturer" between two and five years ago. The vendor had a direct OEM relationship with Microsoft. However counterfeit software produced by a "major" network had found its way into ICM's supplier.

ICM said it would have sought redress from the PC maker, except the supplier went bust in October 2002. Doesn't ring any bells with us. any names?

Update The reader consensus was Dan Technology even though that well-known firm went bust in July 2002. The name of ICM's supplier was ASI, although how that company qualifies as a "major" PC maker escapes us. ®

Related story

Court sentences £50m MS piracy ring to 10 years

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.