Government Technology

Personal Computing: Pirates Among Us

September 24, 2009 By

Are you a software pirate? Even if you're not aware of using commercial computer programs you haven't paid for, if you work in an office, chances are higher than you might think.

This is according to a recent study by the Business Software Alliance, or BSA, which estimated that fully 20 percent of commercial programs installed in the U.S. last year were unpaid for.

The most common way this happens is when a company with 100 to 500 employees buys a few copies of a program and installs it on hundreds of PCs. As the BSA points out at its Web site, "What a lot of people don't realize ... is that when you purchase software, you are actually purchasing a license to use it, not the actual software. That license is what tells you how many times you can install the software."

Pirated software is also obtained by individuals through a piracy underground where crackers disable copy protections and distribute the software through pirate Web sites, Usenet discussion groups, and peer-to-peer file sharing networks, often for free. Yet another way is through criminal enterprises that copy and sell it, for profit, abroad as well as domestically on eBay.

The heaviest users of pirated software are manufacturing companies, but other companies, nonprofit organizations, government agencies, schools and individuals have all gotten caught pirating, according to the BSA.

Those using pirated programs don't usually look upon themselves as thieves, according to anecdotal reports. Software piracy may be rationalized by the company president or IT manager as utilizing resources most efficiency. With individuals, in the same way that petty shoplifting is rationalized as costing big stores little money, software piracy may be rationalized as costing big software companies relatively little.

In actuality the loss to software companies was an estimated $53 billion worldwide last year, nearly as much as total software sales, which was $88 billion, according to the BSA.

The issue has an interesting nationalistic angle. The U.S. is by far the largest developer of computer software. The U.S. also has the lowest rate of software piracy of the 110 countries examined, followed by Japan, New Zealand, and Luxembourg. The highest piracy rates were in Armenia, Bangladesh, Georgia and Zimbabwe, all countries in which more than 90 percent of software programs were obtained illegally. The regions with the highest rates of software piracy are Central/Eastern Europe (67 percent) and Latin America (65 percent).

Software piracy hurts U.S. interests. "It undermines local IT service firms [and] gives illegal software users an unfair advantage in business," says BSA president and CEO Robert Holleyman.

Lost profits mean lost jobs and tax revenue. A study last year by the market research firm IDC predicted that lowering PC software piracy by 10 percentage points worldwide over four years would create 600,000 new jobs and $24 billion in higher government revenues.

The BSA is funded by the software industry, and some observers have commented that it exaggerates the financial losses. The majority of the people and organizations who obtain pirated software wouldn't have bought it if they couldn't obtain free copies, contends Paul Craig, a computer security specialist from New Zealand and author of the book Software Piracy Exposed. Instead of buying a commercial program, such parties would use free programs, some of which equal commercial programs in quality.

Still, the reality is that software piracy does lead to the loss of some revenue, it's against the law, and organizations and individuals alike can and do get caught. The most common way software pirates are nabbed is through whistle blowing by a disgruntled current or former employee.

The BSA offers a form at its Web site that anyone can use to anonymously report software piracy, with the BSA paying out monetary rewards in successful cases. Last year the BSA paid $136,000 to 42 informants, making the average award nearly $2,000.

The BSA can sue pirates, but it typically settles with them for considerably more than the software would have cost if they had bought it legally. Last year it settled 588 cases for a total of $9.5 million. If the piracy is particularly egregious, the BSA refers the case to the U.S. Department of Justice for criminal prosecution.

To minimize the chances of piracy, the BSA recommends that organizations designate one person to keep track of software purchases, going through normal purchasing channels rather than employee expense reports or petty cash, and that they keep software discs in a secure place.

| More


Anonymous    |    Commented September 25, 2009

Someone needs to check the math in this article. $53 billion is just over 60% of $88 billion, not "nearly as much." And $136,000 to 42 informants means the average award was over $3,200, not "nearly $2,000"

Anonymous    |    Commented September 25, 2009

Someone needs to check the math in this article. $53 billion is just over 60% of $88 billion, not "nearly as much." And $136,000 to 42 informants means the average award was over $3,200, not "nearly $2,000"

Anonymous    |    Commented September 25, 2009

Someone needs to check the math in this article. $53 billion is just over 60% of $88 billion, not "nearly as much." And $136,000 to 42 informants means the average award was over $3,200, not "nearly $2,000"

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
McAfee Enterprise Security Manager and Threat Intelligence Exchange
As a part of the Intel® Security product offering, McAfee® Enterprise Security Manager and McAfee Threat Intelligence Exchange work together to provide organizations with exactly what they need to fight advanced threats. You get the situational awareness, actionable intelligence, and instantaneous speed to immediately identify, respond to, and proactively neutralize threats in just milliseconds.
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
View All

Featured Papers