Feeds

Bust PC builder lands ICM with huge piracy bill

MS comes calling

  • alert
  • submit to reddit

ICM Computer Group has been landed with a huge bill for buying pirated software unwittingly from an unnamed distributor.

The disaster recovery specialist has set aside £725,000 to cover its obligations to Microsoft, of which £400,000 has already made its way to the software giant.

In a statement accompanying its results yesterday, ICM said it had bought the counterfeit software as part of a routine hardware and software supply agreement from a "large PC manufacturer" between two and five years ago. The vendor had a direct OEM relationship with Microsoft. However counterfeit software produced by a "major" network had found its way into ICM's supplier.

ICM said it would have sought redress from the PC maker, except the supplier went bust in October 2002. Doesn't ring any bells with us. any names?

Update The reader consensus was Dan Technology even though that well-known firm went bust in July 2002. The name of ICM's supplier was ASI, although how that company qualifies as a "major" PC maker escapes us. ®

Related story

Court sentences £50m MS piracy ring to 10 years

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.