Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

What’s a Software License?

We’re not lawyers, and we’re going to keep this in plain English. A software license is a contract that talks about the use or redistribution of a piece of software. It basically explains what you, the user, are allowed to do with the software and what your limitations are.

Think of software like any other medium, such as a novel, a song, a film, or a painting. If a novel is copywritten, it’s illegal to make copies and sell or otherwise distribute them. The publisher, whose job is to distribute and protect the author’s work, has every right to come after you for damages. The same goes for selling or publicly broadcasting someone’s music, or any other copywritten material. Software is no different - someone, or some entity, put a lot of time, money, and talent to build the software in order to distribute or sell it, and they have every right to control how that is done.

The software license grants limitations to the user as far as how many users can use the software. Although we don’t want to go too deep into all of the different rights and limitations that software licenses can have, there are some common categories most software falls into:

Public Domain

This software doesn’t have a copyright. It’s available for anyone to download, distribute, modify, and even sublicense out. This means you can take this software, change it however you want, and redistribute it. There aren’t a lot of famous examples of Public Domain software that we expect most of our readers to recognize, but one example is a portion of 7-Zip (a popular file compression tool) software is open and available for the world to use.

Free and Open Source

This software tends to be free, but “as a matter of liberty, not price.” The software could be free, or the developer could charge for it, but the license allows you to run the program however you want for any purpose, alter the software, redistribute the software, and distribute copies that you’ve modified. There are tons of famous examples, including the Linux operating system, the Firefox web browser, the software that Wikipedia is based on, and the Android operating system.

This type of license does a lot of good for the world, because it allows other developers to improve upon software (adding new features, customizations, or even making it safer) and make it available to the public.

Freeware/Shareware/Freemium

This category is for free (as in price) software. Unlike Free and Open Source software, however, the user doesn’t have the right to modify the software. Some famous examples of this type of software are Adobe PDF, WinZip, and the software for the game League of Legends.

Proprietary Licenses

Although you can’t really say this is the most common license for software, when it comes to commercial software, this is the license you usually run into. Proprietary software essentially means the copyright owner owns the software and you just have the right to use it. You can’t copy it, change it, or redistribute it in any way unless you get a specific license from the developer. Examples of this type of software are Microsoft Windows, macOS, Adobe Photoshop, and most commercial video games.

Trade Secret

Trade secret software tends to not be distributed the same way as most other software, and the portion of the software that is considered ‘trade secret’ doesn’t typically get installed on your device, or it’s installed on proprietary hardware that you don’t have a lot of control over. A lot of cloud-hosted software works this way. Think of the secret recipe for Coca-Cola, the inner workings of trade secret software is kept behind locked doors.

Why You Need to Audit Your Software Licenses

Your probably use a lot of software every day without thinking about it. You’ve got your workstation operating systems (typically Windows 10), your server operating systems, you likely use Microsoft Office or Adobe. Then there is your line of business app, your accounting/payroll software, inventory management, antivirus, your security camera software, software for your website, etc.

There are a lot of moving parts, and there are a lot of things to think about. For example, if a software license lapses, you might still be able to use that software, but you stop getting security updates and patches, which could leave you vulnerable.

It’s also critical to know your limitations with your software. For example, is the software restricted to the number of users it can use, or is it restricted to the number of devices it can be installed on? 

You Might Ask “Well How Will Anyone Know?”

You might think it doesn’t hurt anybody to share a piece of software that you purchased. You might pass over the installation files or let someone borrow the CD-ROM and think nothing of it. Unfortunately, this gesture could break your software license, and developers have several systems in place to identify it.

The Software Might ‘Phone Home’

Often, proprietary software will use the Internet to communicate to check for updates and check to validate the license. If it detects issues, it might deactivate the software or simply report back that something illegitimate is happening. 

The Software Might Require User Login

This method is becoming increasingly popular. If you log into the software on too many devices, it will deactivate on some of them based on the license. Basically, the software will prevent itself from being used across too many devices. 

Scary Whistleblower Programs

The arguably most nefarious solution that software developers have come up with is pitting your own employees or former employees against your business. The most famous (or infamous?) organization to come to mind is the Business Software Alliance (BSA). 

The BSA is an advocate for the software industry with a mission to help businesses protect the software they’ve developed. On the cover, it sounds like a good endeavor; after all, they strive to protect a business’ intellectual property. Unfortunately, they utilize some pretty sketchy tactics to do so.

The BSA has been known to market advertisements to people to encourage them to report their employer or former employer of misusing software licenses. The BSA even offers cash rewards and promises to keep the whistleblower anonymous. How do you feel about an organization targeting and bribing your employees to encourage them to report you? It’s just icky.

If your business gets reported, the BSA is relentless when it comes to sending cease and desists and forcing audits and threatening lawsuits. It’s just not a situation you want to find yourself in.

Don’t Risk It - Comply to Your Software Licenses

The first step is to audit all of the software you are using and get familiar with the software licenses. Document how many users and devices you can use it on, and what users and devices you are actually assigning the license to.

You’ll also want to document the purchase date of software, and if the software requires renewal, document that as well. Keep receipts and file them along with the rest of this documentation.

Any software that your company doesn’t need to operate should be uninstalled and removed from the network. It doesn’t hurt to make a list of exceptions too, for example, if you allow your employees to listen to music, allowing Spotify to be installed could be in your list of exceptions.

If you need assistance getting everything organized, the experts at Voyage Technology can help. Give us a call at 800.618.9844 to talk about protecting your business from unexpected software license violations.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Mobile Device Smartphones Saving Money Workplace Strategy Business Management communications Android Mobile Devices VoIP Smartphone Managed IT Services Microsoft Office Data Recovery Browser Managed Service Social Media Passwords Upgrade Disaster Recovery Backup Network Tech Term Internet of Things Automation Artificial Intelligence Covid-19 Cloud Computing Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Encryption Gadgets Spam Windows 10 Information Employee/Employer Relationship Holiday Business Continuity Data Management Government Productivity Business Technology Windows 10 Blockchain Wi-Fi Two-factor Authentication Bandwidth Compliance Data Security Current Events Virtualization Apps Managed Services Voice over Internet Protocol Office Chrome Budget Mobile Device Management Networking Apple Gmail App Vendor Employer-Employee Relationship Office 365 Hacker Conferencing Avoiding Downtime Mobile Office How To BDR Applications Computing Information Technology Access Control Computers Analytics Office Tips Healthcare Augmented Reality Retail Website Marketing Storage Password Bring Your Own Device Managed IT Services AI WiFi HIPAA Router Big Data BYOD Operating System Virtual Private Network Training Risk Management Health Help Desk Customer Service Tip of the week Remote Workers Document Management IT Support Telephone Free Resource Scam Data loss Project Management Windows 7 Cooperation Firewall Microsoft 365 Solutions Patch Management Save Money Remote Monitoring The Internet of Things Going Green End of Support Vulnerability Vendor Management Social Windows 11 Cybercrime Display Printer Excel Paperless Office Monitoring Infrastructure Virtual Desktop Virtual Machines Professional Services Data storage Hacking LiFi Presentation Saving Time Machine Learning Outlook Managed IT Service Wireless Technology iPhone Money Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Word Sports Entertainment Mouse Images 101 Mobility Multi-Factor Authentication Administration Telephone System Cost Management Robot Safety Employees Integration Settings Wireless IT Management Printing Meetings Content Filtering VPN Modem User Tip YouTube Processor Holidays 2FA Mobile Security Supply Chain Cryptocurrency Computer Repair Data Storage Customer Relationship Management Video Conferencing Smart Technology Managed Services Provider Paperless Addiction Language Google Wallet Websites Gig Economy Internet Service Provider Co-managed IT Management Teamwork Chatbots SharePoint Screen Reader Evernote Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop Memes Business Communications Service Level Agreement Computing Infrastructure Drones User Writing Net Neutrality Scams SQL Server Lenovo Identity Smart Tech Virtual Reality Financial Data Hybrid Work Halloween Bookmark History IT Human Resources Download Server Management Alerts IP Address Private Cloud Smartwatch Identity Theft Procurement Cables Azure Superfish Connectivity Tech Break Fix Hacks Twitter Telework Scary Stories Browsers Cyber security Communitications Google Apps Fun Upload Error Recovery CES Multi-Factor Security Hard Drives Deep Learning Social Engineering Supply Chain Management IT Maintenance Social Network IoT Term Dark Web Domains Remote Computing FinTech Business Intelligence Education IT Assessment Shortcuts Trends Tablet Google Calendar Refrigeration Flexibility Ransmoware Customer Resource management Value Regulations Star Wars Microsoft Excel Public Speaking Mobile Computing Alert Organization Vendors Data Analysis Digital Security Cameras Dark Data Smart Devices Be Proactive Search Gamification Managed IT Staff Lithium-ion battery File Sharing Legislation Best Practice How To Entrepreneur Remote Working Workforce Memory Social Networking Fileless Malware Data Breach Google Play Notifications Threats Buisness Videos IT solutions Electronic Health Records Workplace Strategies Content Wearable Technology Legal Travel Techology Motherboard Google Maps Comparison Undo Business Growth Meta Health IT Wasting Time Directions Trend Micro Assessment Security Cameras Permissions Amazon Unified Threat Management Software as a Service Cortana Unified Threat Management Specifications Alt Codes Outsource IT Managing Costs Downtime Microchip eCommerce Media Internet Exlporer SSID Fraud Environment Application Hosted Solution Network Congestion Surveillance Username Virtual Assistant User Error Black Friday Typing Physical Security Small Businesses Virtual Machine Database Medical IT IBM Reviews Displays Google Drive Point of Sale Development Knowledge Transportation IT Technicians Cookies Cyber Monday Outsourcing Proxy Server Hypervisor Optimization 5G Tactics PowerPoint Network Management Hotspot Tech Support Shopping Google Docs Unified Communications Monitors Workplace Experience Employer/Employee Relationships Mirgation Nanotechnology Navigation Competition Bitcoin PCI DSS Hiring/Firing Running Cable

Blog Archive