Feeds

Microsoft reveals piracy battle plan for the UK

For the good of the economy, of course

High performance access to file storage

Microsoft has launched a campaign targeting software piracy in the UK. Called 'Keep IT Real', the campaign aims to reduce the UK piracy level for Windows by five per cent to 11.7 per cent within three years. The company says its goal would help the UK economy.

"Keep IT Real will help us to address the problem in a number of ways," Microsoft UK head of anti-piracy Michala Alexander said. "By educating customers on how to purchase legitimate software, we can protect them from the risks associated with piracy. And by closing down channels for the sale of pirate software, we can reduce the impact of illegal trade on Microsoft's UK partners."

Over the next six months, Microsoft plans to send two teams of investigators to 800 technology vendors suspected of hard-disk loading (where PC vendors charge multiple customers for copies of the software pre-installed on PCs, but provide a license agreement valid for only one copy) or other forms of piracy.

Microsoft will then assess the findings of the operation, known as 'Feet on the Street', and decide on the appropriate course of action for each case. This could include prosecution.

"A small number of IT vendors are at the moment putting customers at risk of unwittingly running illegal software," Alexander said. "The work of the Feet on the Street teams will make clear to these vendors that Microsoft will not tolerate illegal copies of its software being sold."

Microsoft is increasing its commitment to the pursuit of legal action.

Earlier this week the company announced the initial results of a crackdown on the sale of counterfeit software in the Glasgow area. In projects spanning three years, investigations were conducted into 12 companies, resulting in court proceedings and payments of up to £75,000 each.

The software giant is also working with auction and retail websites to tackle piracy. It reports that, under eBay’s VeRO programme, over 35,000 suspected illegal sales items have been removed from the eBay site since August 2005.

Copyright © 2006, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.