Feeds

Bust PC builder lands ICM with huge piracy bill

MS comes calling

  • alert
  • submit to reddit

ICM Computer Group has been landed with a huge bill for buying pirated software unwittingly from an unnamed distributor.

The disaster recovery specialist has set aside £725,000 to cover its obligations to Microsoft, of which £400,000 has already made its way to the software giant.

In a statement accompanying its results yesterday, ICM said it had bought the counterfeit software as part of a routine hardware and software supply agreement from a "large PC manufacturer" between two and five years ago. The vendor had a direct OEM relationship with Microsoft. However counterfeit software produced by a "major" network had found its way into ICM's supplier.

ICM said it would have sought redress from the PC maker, except the supplier went bust in October 2002. Doesn't ring any bells with us. any names?

Update The reader consensus was Dan Technology even though that well-known firm went bust in July 2002. The name of ICM's supplier was ASI, although how that company qualifies as a "major" PC maker escapes us. ®

Related story

Court sentences £50m MS piracy ring to 10 years

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.