202211.14
Off
0

Software Audits: The Importance of Timely Completion of Post-Settlement Obligations

in Blogs

Software audits initiated by software publishers or representative entities, such as the Business Software Alliance (“BSA”) and Software & Information Industry Association (“SIIA”), are often resolved by an out-of-court settlement. The carefully crafted settlement agreements release an audited company from liability, contingent on the following obligations: 1) The accuracy of the submitted audit results, 2) Payment of…

202210.31
Off
0

Effective Audit-Response Policies Can Be Vital in Responding to Software Audits

in Blogs

Businesses often have close relationships with software vendors, and that closeness usually is in direct proportion to the extent and importance of those vendors’ software products in the businesses’ network environments. However, despite their best marketing efforts, software vendors’ interests always will remain aligned primarily with their own bottom line, and that often means that…

202209.19
Off
0

Software-Audit Compliance Demands Often Include “Fuzzy Math”

in Blogs

In defending against software audits initiated by publishers such as Microsoft or IBM, many businesses make the mistake of assuming that those publishers or their designated auditors know what they are talking about when it comes to determining what licenses need to be purchased in order to achieve compliance. After all, the companies that wrote…

202208.08
Off
0

Control Software Audit Disclosures By Keeping an Eye on the Audited Entity

in Blogs

In many cases where we are retained to assist companies targeted for software audits after software-deployment data already has been submitted to the auditing entities, we have the regrettable obligation to let our clients know that they have disclosed too much. Over-disclosure can cost a company millions of dollars, and it is typically very difficult…

202207.18
Off
0

Not All Software Audits Protected By Privilege

in Blogs

Companies faced with a demand for a software audit from a software publisher or an entity such as the Business Software Alliance or Software & Information Industry Association are increasingly turning to their own internal IT departments or hiring technology consultants to conduct software audits, the results of which may be discoverable in future litigation….

202207.11
Off
0

Fundamentals of Software Audit Data Collection – Hardware Inventory

in Blogs

In order to effectively manage their software usage and to mitigate compliance exposure, companies need to know how to gather and analyze information regarding their product usage. While some software products may have unique data-collection requirements that ordinarily would not be applicable for other products, usage levels for many products can be measured using a…

202207.05
Off
1

High-Level Data-Collection Strategies for Software Audits

In our experience, many companies facing software-licensing audits initiated by vendors like Microsoft, Oracle or IBM seem to be under the impression that auditors have a nearly unfettered right to information. This is not the case. However, too many audit targets discover too late that what may have seemed like good-faith cooperation in the interest…

202206.20
Off
0

Top Three Early Strategic Steps in Enterprise Software Audits

in Blogs

No one likes to be audited. In most cases, there is little that a business can do at the outset of an audit to avoid licensing exposure, if that business has historically inadequate software asset management processes. However, there are steps that all audited companies usually can take – regardless of which publisher is conducting…

202206.01
Off
0

Know When to Say When in Response to Auditors’ Requests for Information

in Blogs

Software audits can be intensely frustrating ordeals for businesses to navigate. Many publishers will go to great lengths to cajole their customers with assurances of amicability and license-optimization opportunities, but most IT managers know that the reality of audits in almost all cases is anything but friendly and fraught with pitfalls. However, the first things…

202204.25
Off
0

Be Wary of Audit Tools Promoted by Software Auditors

in Blogs

Most companies with more than a handful of computers in their IT environments rely on the results of network-inventory tools to gather the deployment data needed for accurate software audits. Without the tools, a business would be required to assign valuable resources to manually looking at the titles installed on each machine. Therefore, it should…