201905.01
0

Can a Software Publisher Force You to Audit Your Customers?

Many software-solution vendors utilize third-party infrastructure or application programs as frameworks for embedded solutions that they sell to their customers and install on their customers’ computers. Licenses for those third-party products typically can be acquired by a vendor and passed to its customers pursuant to the terms of an Independent Software Vendor (ISV) or Original…

201904.10
0

Be Wary of Requests for Mystery Data

Software auditors such as KPMG, Deloitte and PriceWaterhouseCoopers like to have things their way. It’s an understandable impulse – with likely hundreds of audits pending at any one time, the natural inclination is to standardize the process around a single set of tools and processes with which the auditors are most familiar. However, those tools…

201903.19
0

Is it Possible to Short-Circuit a Software Audit?

Companies react in different ways after receiving a letter from the Business Software Alliance (BSA) or the Software & Information Industry Association (SIIA) demanding a software audit. Some ignore the letter, assuming it to be some kind of spam or marketing ploy. This is not advisable. Audit demands from the BSA and SIIA generally are…

201901.15
0

How to Conduct a Software Audit

One of the tasks with which Scott & Scott’s clients most commonly request our assistance is how to conduct a software audit. While almost all companies, large and small, use software in order to conduct their business operations, many of those companies lack mature or even nascent software asset management practices. Consequently, when asked to…

201810.10
0

Key Components of Software Audit Response Policies

Software audits are significant legal and financial risks for all companies. With more and more software publishers utilizing intrusive audits and other information-gathering exercises as the basis for licensing transactions and – more troublingly – as sources of revenue through compliance-enforcement actions, more of our clients are implementing detailed policies to define whether and how…

201803.07
0

Fundamentals of Software Audit Data Collection – Virtualization Inventory

In order to effectively manage their software usage and to mitigate compliance exposure, companies need to know how to gather and analyze information regarding their product usage. While some software products may have unique data-collection requirements that ordinarily would not be applicable for other products, usage levels for many products can be measured using a…