201604.12
0

Shadow IT: When Employees Become Bounty Hunters

Michael O’Dwyer, ipswitch, 4/11/16 Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT.

201602.16
0

How To Survive A Software Licensing Audit

Lisa Morgan, InformationWeek, 1/1/16 Enterprise IT organizations face software audits as a matter of doing business with large technology vendors. What’s the best approach to dealing with them? Here’s a look at what you should and shouldn’t do when you get that software licensing audit notice.

201602.16
0

Software Licensing Audits: Is Your Company Prepared?

Lisa Morgan, InformationWeek, 12/31/15 Software licensing audits can cause minor annoyance or excruciating pain, depending on their scope and how ready your enterprise is for the disruption and expense. We take a look at trends in software licensing audits and the ways they impact your IT organization and your business.

201602.11
0

How to Find the Best Lawyer for Your BSA Audit Case

I am a partner in Scott & Scott, LLP a firm that focuses on technology law matters in Southlake, Texas.  We represent companies accused of software piracy by industry trade groups such as the Business Software Alliance and Software Information and Industry Association.  I had my first encounter with the BSA in 2004 when they…

201601.09
0

Autodesk License Alert

One venerable software license model that many companies have utilized in the past has been the license upgrade, under which a licensee could acquire the right to deploy the newest version of a product at a much-reduced price, provided that the licensee also owns a full license for a qualifying, earlier version of the same…