Release Management Authors: Pat Romanski, Elizabeth White, David H Deans, Liz McMillan, Jnan Dash

News Feed Item

Texas Identified as Software Piracy Hotspot

Houston and surrounding area tops Dallas-Ft. Worth as the state's most active region for illegal software use

WASHINGTON, Oct. 29 /PRNewswire-USNewswire/ -- The Business Software Alliance (BSA), the voice of the world's commercial software industry, has identified Texas as a national hotspot in terms of reports of illegal software use and is urging individuals across the state and in the Houston area specifically to report the use of pirated software by businesses to NoPiracy.com.

In conjunction with the online software piracy reporting network at NoPiracy.com, BSA also maintains the manned 1-888-NO PIRACY hotline. Individuals can confidentially offer information on unlicensed software use as well as register to claim rewards of up to $1 million. Since 2008, BSA has paid a total of $220,650 in rewards for verifiable tips of software piracy. Despite the rewards program, many opt not to take the reward, citing their motivation as simply "to do the right thing."

Reporting by the general public over the past nine months shows that the state of Texas is a top five hotspot for reports of illegal software use with a large portion coming from the Houston area. Dallas-Ft. Worth was a close second in terms of reports of software piracy, while the Austin and San Antonio regions were a distant third and fourth.

"This is the first time BSA has identified specific U.S. states as 'Software Piracy Hotspots,' although our records over the last years have shown that Houston has consistently been active in terms of illegal software reports," said Jenny Blank, Senior Director of Legal Affairs for BSA. "Our analysis of the trends suggests two things: First, given the number of leads from Southeastern and central Texas, people in the state are obviously quite concerned about this issue and don't like the idea of local companies using what amounts to stolen software products. Second, there are clearly a lot of companies in Texas who are not concerned that they are breaking the law and are willing to take the risks associated with that decision. For many companies, such blatant disregard for the law has proven costly."

Each year, BSA receives on average over 2,500 reports of software piracy from across the country. The majority of the reports come from current or former employees who had information related to the unlicensed software activity.

According to the Sixth Annual BSA-IDC Global Software Piracy Study, the retail value of unlicensed software installed in 2008 -- representing revenue losses to software companies -- was estimated at $9.1 billion in the United States and $53 billion worldwide.

The national average software piracy rate in 2008 was 20%, meaning that one in five pieces of PC software installed in the United States was unlicensed. Texas' rate however is also 20% according to the 2007 State Piracy Report released last year and also conducted by IDC. While in line with the national average, the rate is still dismally high given the cost of piracy to the economy.

Software piracy in Texas cost software vendors an estimated $627 million, which is the third-highest figure of the eight states included in the study. Lost revenues to a wider group of Texas software distributors and service providers cost an additional $1.7 billion, which is, for example, enough to hire more than 9,200 tech workers. The lost state and local tax revenues -- $223 million -- would also have been enough to fund the hiring of more than 4,000 experienced police officers. These are significant economic losses especially in light of the troubled economy.

Reducing piracy brings tangible economic benefits to the local IT industry and local communities. For every $1 of PC software licensed, there is another $3 to $4 of revenues for local service and distribution firms, as well as tax revenues to support local services, according to the BSA-IDC Global Software Piracy Study.

"Staggering economic losses like these clearly appear to resonate with many individuals in Texas who have decided to come forward and confidentially report instances of unlicensed software use in their organizations," said Blank.

Financial Risks

Businesses found to be using unlicensed software may be required to pay thousands of dollars in damages to BSA. A company found using unlicensed software and violating copyright laws could pay damages of up to $150,000 for each software title copied. If convicted, violators can be fined up to $250,000 per title or given a jail term of up to five years, or both.

When BSA receives a tip about a company using pirated software, it typically contacts the company and asks it to conduct an audit of its software assets. If unlicensed software is found, the next step is for both parties to work toward a resolution that involves immediate legalization of software.

Security Risks

Pirated software can also pose security risks to the users' networks and computers. Company computers can be infected with trojans, viruses, malware, and other threats, and this in turn can expose sensitive data and personal information of employees and customers. As companies and government agencies have found, having confidential information exposed to outsiders is costly and can put an organization's reputation at risk.

Tools & Resources to Ensure Compliance

BSA works with businesses to help ensure that their company isn't at risk of the financial, technical, and legal risks associated with illegal software. In addition to the educational and self-audit resources provided online at www.bsa.org, BSA has partnered with the U.S. Small Business Administration to educate up to 100,000 small businesses on software licenses, copyright laws, tips on how to purchase safe and legal software online, and how to develop an SAM program.

Businesses trying to determine whether their organizations are using unlicensed software can download the free software audit tools at www.bsaaudit.com.

Please visit our Facebook page under keyword Business Software Alliance (BSA) Anti-Piracy.

About BSA

The Business Software Alliance (www.bsa.org) is the foremost organization dedicated to promoting a safe and legal digital world. BSA is the voice of the world's commercial software industry and its hardware partners before governments and in the international marketplace. Its members represent one of the fastest growing industries in the world. BSA programs foster technology innovation through education and policy initiatives that promote copyright protection, cyber security, trade and e-commerce. BSA members include Adobe, Apple, Autodesk, Bentley Systems, Corel, CyberLink, Dassault Systemes SolidWorks Corporation, Embarcadero, McAfee, Microsoft, Minitab, Quark, Quest Software, Rosetta Stone, Siemens, Sybase, Symantec, and The MathWorks.

SOURCE Business Software Alliance

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...