This preview shows page 1. Sign up to view the full content.
Unformatted text preview: needs to be educated on the restrictions the company is under and make sure proper enforcement mechanisms are in place. If a company is found guilty of illegally copying software or using more copies than its license
permits, the security officer in charge of this task may be primarily responsible.
Thanks to easy access to high-speed Internet, employees’ ability—if not the temptation—to download and use pirated software has greatly increased. A study by the Business
Software Alliance (BSA) and International Data Corporation (IDC) found that the
frequency of illegal software is 36 percent worldwide. This means that for every two
dollars’ worth of legal software that is purchased, one dollar’s worth is pirated. Software
developers often use these numbers to calculate losses resulting from pirated copies.
The assumption is that if the pirated copy had not been available, then everyone who is
using a pirated copy would have instead purchased it legally.
Not every country recognizes software piracy as a crime, but several international
organizations have made strides in curbing the practice. The Software Protection Association (SPA) has been formed by major companies to enforce proprietary rights of
software. The association was created to protect the founding companies’ software developments, but it also helps others ensure that their software is properly licensed.
These are huge issues for companies that develop and produce software, because a majority of their revenue comes from licensing fees. ch10.indd 864 12/4/2009 11:39:08 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 865
Other international groups have been formed to protect against software piracy,
including the Federation Against Software Theft (FAST), headquartered in London, and
the Business Software Alliance (BSA), based in Washington, D.C. They provide similar
functionality as the SPA and make efforts to protect software aroun...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12