Feeds

BSA software audit ‘will not trigger legal action’

It's confidential. Really, truly, really

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The Business Software Alliance last week launched a 'software detox' initiative to help organisations check their software licenses. Today, the anti-piracy group rejected concerns that firms could incriminate
themselves via the on-line audit returns.

Software asset management is an integral part of good business governance. Last year, over 4,500 businesses completed the BSA's Software Audit Return. The online form enables businesses to review the software in use and the licenses purchased.

"While many organisations realise the risks associated with illegal software, few are taking proactive steps to prevent software mismanagement," said Mike Newton, BSA spokesperson. "The Software Audit Return form enables companies to take the vital first step towards implementing effective software asset management processes and ensuring they are free of illegal software that could put the business at risk."

The BSA describes itself as the voice of the world's commercial software industry and its hardware partners before governments and in the
international marketplace. Recent research carried out on its behalf revealed that 32 per cent of companies either are not software compliant or do
not know whether the software installed has been copied or downloaded illegally.

But a fear of some organisations is that completing the BSA's audit could incriminate them if the results reveal, for example, too few software licenses for the number of users - and the BSA is known for taking tough action against non-compliant organisations.

OUT-LAW.COM put this concern to the BSA: Will it use the results of the audits to identify new targets for legal action?

"Absolutely not," said Graham Arthur, legal counsel at the BSA. "All information received through the audit process is kept confidential and will not be passed to our enforcement team and will not trigger legal action."

Arthur continued:

"If a company comes forward to complete the audit, no action will be taken. The only exceptions to that would be if the company was already under investigation or if it is later reported to us
independently, for example by an employee.

"If the audit process reveals unlicensed software, we will only recommend that a company either pays for the appropriate licenses or deletes the software. We may follow that with a letter seeking confirmation that the company is now compliant."

We asked what would happen if the BSA sent such a letter and received no response from the company.

Arthur explained: "That will be the end of the process. However, if the company is later reported to us independently of the audit and enforcement action is taken, that letter may be used as evidence to show
that the company was aware that it was non-compliant."

He was anxious to point out to organisations that the focus of the BSA's new approach is on effective software asset management, that it can help to highlight other dangers of illegal software use, such as susceptibility to viruses and lack of support.

"The emphasis is on raising awareness, concludes Arthur. "It is not about enforcement."

© copyright 2004 OUT-LAW.com

OUT-LAW.COM is part of international law firm Masons.

Related stories

BSA 'software detox' scheme targets illegal software
IT firms top UK software piracy roll of shame
BSA imagines open source policy, attacks mass.gov

Providing a secure and efficient Helpdesk

More from The Register

next story
Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
Windows NEIN skipped, tech preview due out on Wednesday
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.