SOFTWARE PIRACY & WORKPLACE ETHICS
What Is Software Piracy? <ul><li>Unauthorized copying/installation/use </li></ul><ul><li>Unauthorized distribution or sale...
Impact of Global Software Piracy <ul><li>36% piracy rate  </li></ul><ul><li>$29 billion in lost revenue </li></ul><ul><li>...
Types of Software Piracy <ul><li>End-user copying </li></ul><ul><li>Electronic distribution </li></ul><ul><li>Physical dis...
Technical, Legal and Ethical  Consequences of Pirated Software Use <ul><li>No upgrades </li></ul><ul><li>No assurance of q...
Avoiding the Risk: Proactive Software Asset Management <ul><li>Policy </li></ul><ul><li>Education </li></ul><ul><li>Purcha...
Our Office Policy <ul><li>States our company’s intolerance of software piracy </li></ul><ul><li>Identifies individuals in ...
Employee Education <ul><li>We provide information on software piracy and the problems associated with it </li></ul><ul><li...
Software Purchasing Controls <ul><li>We centralize purchases in one department </li></ul><ul><li>We require purchase reque...
Budget <ul><li>Anticipate software needs in coming year </li></ul><ul><li>Budget appropriately for needed growth </li></ul>
Self Audit Process <ul><li>Start with assessment of needs </li></ul><ul><li>Audit software installed on computers </li></u...
Business Software Alliance (BSA) <ul><li>Educates computer users on respect for intellectual property and copyright compli...
BSA Information and Tools <ul><li>www.bsa.org </li></ul><ul><ul><li>BSA “Guide to Software Management” </li></ul></ul><ul>...
Upcoming SlideShare
Loading in …5
×

Software Asset Management Power Point For Employers W Presentation Notes

1,382 views

Published on

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,382
On SlideShare
0
From Embeds
0
Number of Embeds
27
Actions
Shares
0
Downloads
48
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Software Asset Management Power Point For Employers W Presentation Notes

    1. 1. SOFTWARE PIRACY & WORKPLACE ETHICS
    2. 2. What Is Software Piracy? <ul><li>Unauthorized copying/installation/use </li></ul><ul><li>Unauthorized distribution or sale </li></ul>
    3. 3. Impact of Global Software Piracy <ul><li>36% piracy rate </li></ul><ul><li>$29 billion in lost revenue </li></ul><ul><li>Hundreds of thousands of job losses </li></ul><ul><li>Billions in lost tax revenues </li></ul>“ 2004 Global Software Piracy Study,” conducted by International Data Corporation, July 2004
    4. 4. Types of Software Piracy <ul><li>End-user copying </li></ul><ul><li>Electronic distribution </li></ul><ul><li>Physical distribution </li></ul>
    5. 5. Technical, Legal and Ethical Consequences of Pirated Software Use <ul><li>No upgrades </li></ul><ul><li>No assurance of quality or reliability </li></ul><ul><li>No technical support, manuals or documentation </li></ul><ul><li>Exposure of your network to security breaches </li></ul><ul><li>Consumption of bandwidth </li></ul><ul><li>Sends message: It’s okay to steal </li></ul><ul><li>Serious legal exposure -- $150,000 per program copied </li></ul>
    6. 6. Avoiding the Risk: Proactive Software Asset Management <ul><li>Policy </li></ul><ul><li>Education </li></ul><ul><li>Purchasing Control </li></ul><ul><li>Budget </li></ul><ul><li>Self-audits </li></ul>
    7. 7. Our Office Policy <ul><li>States our company’s intolerance of software piracy </li></ul><ul><li>Identifies individuals in charge of software installations </li></ul><ul><li>Identifies procedures for acquiring needed software </li></ul><ul><li>Specifies rules on Internet usage and prohibits software downloading/uploading </li></ul><ul><li>Makes consequences for violations clear </li></ul>
    8. 8. Employee Education <ul><li>We provide information on software piracy and the problems associated with it </li></ul><ul><li>We ensure regular distribution of office management policy </li></ul><ul><li>We provide an opportunity for questions </li></ul>
    9. 9. Software Purchasing Controls <ul><li>We centralize purchases in one department </li></ul><ul><li>We require purchase requests to be in writing, with appropriate approval </li></ul><ul><li>We confirm requested software is on approved list </li></ul><ul><li>We specify reputable dealers </li></ul><ul><li>We ensure complete documentation </li></ul><ul><li>We prohibit purchases on individual expense accounts </li></ul>
    10. 10. Budget <ul><li>Anticipate software needs in coming year </li></ul><ul><li>Budget appropriately for needed growth </li></ul>
    11. 11. Self Audit Process <ul><li>Start with assessment of needs </li></ul><ul><li>Audit software installed on computers </li></ul><ul><li>Collect licensing and purchase documents </li></ul><ul><li>Delete unneeded software </li></ul><ul><li>Purchase licenses for needed but unlicensed software </li></ul><ul><li>REPEAT REGULARLY </li></ul>
    12. 12. Business Software Alliance (BSA) <ul><li>Educates computer users on respect for intellectual property and copyright compliance </li></ul><ul><li>Advocates strong intellectual property protection, cyber security, e-commerce and trade opportunities </li></ul><ul><li>Enforces the rights of copyright holders </li></ul>
    13. 13. BSA Information and Tools <ul><li>www.bsa.org </li></ul><ul><ul><li>BSA “Guide to Software Management” </li></ul></ul><ul><ul><li>Free software audit tools </li></ul></ul><ul><ul><li>Fact sheets </li></ul></ul><ul><ul><li>Asset management resources </li></ul></ul><ul><ul><li>Free, toll-free hotline, 1 888 NO PIRACY </li></ul></ul>

    ×