Your SlideShare is downloading. ×
0
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Software  Asset  Management  Power Point For  Employers W  Presentation  Notes
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Software Asset Management Power Point For Employers W Presentation Notes

1,078

Published on

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,078
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
46
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. SOFTWARE PIRACY & WORKPLACE ETHICS
    • 2. What Is Software Piracy? <ul><li>Unauthorized copying/installation/use </li></ul><ul><li>Unauthorized distribution or sale </li></ul>
    • 3. Impact of Global Software Piracy <ul><li>36% piracy rate </li></ul><ul><li>$29 billion in lost revenue </li></ul><ul><li>Hundreds of thousands of job losses </li></ul><ul><li>Billions in lost tax revenues </li></ul>“ 2004 Global Software Piracy Study,” conducted by International Data Corporation, July 2004
    • 4. Types of Software Piracy <ul><li>End-user copying </li></ul><ul><li>Electronic distribution </li></ul><ul><li>Physical distribution </li></ul>
    • 5. Technical, Legal and Ethical Consequences of Pirated Software Use <ul><li>No upgrades </li></ul><ul><li>No assurance of quality or reliability </li></ul><ul><li>No technical support, manuals or documentation </li></ul><ul><li>Exposure of your network to security breaches </li></ul><ul><li>Consumption of bandwidth </li></ul><ul><li>Sends message: It’s okay to steal </li></ul><ul><li>Serious legal exposure -- $150,000 per program copied </li></ul>
    • 6. Avoiding the Risk: Proactive Software Asset Management <ul><li>Policy </li></ul><ul><li>Education </li></ul><ul><li>Purchasing Control </li></ul><ul><li>Budget </li></ul><ul><li>Self-audits </li></ul>
    • 7. Our Office Policy <ul><li>States our company’s intolerance of software piracy </li></ul><ul><li>Identifies individuals in charge of software installations </li></ul><ul><li>Identifies procedures for acquiring needed software </li></ul><ul><li>Specifies rules on Internet usage and prohibits software downloading/uploading </li></ul><ul><li>Makes consequences for violations clear </li></ul>
    • 8. Employee Education <ul><li>We provide information on software piracy and the problems associated with it </li></ul><ul><li>We ensure regular distribution of office management policy </li></ul><ul><li>We provide an opportunity for questions </li></ul>
    • 9. Software Purchasing Controls <ul><li>We centralize purchases in one department </li></ul><ul><li>We require purchase requests to be in writing, with appropriate approval </li></ul><ul><li>We confirm requested software is on approved list </li></ul><ul><li>We specify reputable dealers </li></ul><ul><li>We ensure complete documentation </li></ul><ul><li>We prohibit purchases on individual expense accounts </li></ul>
    • 10. Budget <ul><li>Anticipate software needs in coming year </li></ul><ul><li>Budget appropriately for needed growth </li></ul>
    • 11. Self Audit Process <ul><li>Start with assessment of needs </li></ul><ul><li>Audit software installed on computers </li></ul><ul><li>Collect licensing and purchase documents </li></ul><ul><li>Delete unneeded software </li></ul><ul><li>Purchase licenses for needed but unlicensed software </li></ul><ul><li>REPEAT REGULARLY </li></ul>
    • 12. Business Software Alliance (BSA) <ul><li>Educates computer users on respect for intellectual property and copyright compliance </li></ul><ul><li>Advocates strong intellectual property protection, cyber security, e-commerce and trade opportunities </li></ul><ul><li>Enforces the rights of copyright holders </li></ul>
    • 13. BSA Information and Tools <ul><li>www.bsa.org </li></ul><ul><ul><li>BSA “Guide to Software Management” </li></ul></ul><ul><ul><li>Free software audit tools </li></ul></ul><ul><ul><li>Fact sheets </li></ul></ul><ul><ul><li>Asset management resources </li></ul></ul><ul><ul><li>Free, toll-free hotline, 1 888 NO PIRACY </li></ul></ul>

    ×