View
73
Download
1
Embed Size (px)
Citation preview
Software Compliance An overview
S. PERIYAKARUPPAN (PK)
Contents
• Software Compliance• 3 Major factors• Internet piracy• Soft lifting• Counterfeiting• Do’s• Don’ts
Software Compliance ??? SOFTWARE COMPLIANCE IS BEING ABLE TO DEMONSTRATE THAT YOU HAVE THE CORRECT NUMBER OF LICENSES PAID FOR AND ACCOUNTED FOR ON YOUR SYSTEMS COMPARED AND MATCHED TO WHAT YOU HAVE INSTALLED
Why???? INTELLECTUAL PROPERTY & COPYRIGHTSIT IS ILLEGAL TO HAVE OBTAINED SOME ONE ELSE INTELLECTUAL PROPERTY
Non-Compliance is either the intentional, or unintentional misuse of copyrighted software assets
3 Major Factors
Internet PiracySoft LiftingCounterfeit software
Cracking software licence keysViolating use of trial versions
The purchasing of a single licensed copy of a software program and the loading of it on several machines, contrary to terms of agreement.
Fake copies of licensed softwares.
Internet Piracy
Experts BlogsFree development toolsOpen Source softwaresP2P file hostingOpen proxiesSearch Engines
Over number of installations of software to its license terms or In-appropriate use of installation Trial version used for Commercials
leaves you in the air and leads to non-compliance
Soft Lifting
Software Counterfeiting
I am looking for a latest version of MS OS ..!!
Drive by download
Leave un-noticed open source/trial software in your system
Open source or trial version of softwares left un-installed for a long time leads to “Non-Compliance”
Do’s
• Use open source software for development purpose• Use least privilege to execute software.• Use licensed software for production.• Document the usage of licensed software products.• Use open source software with due attention of
non-commercial use• Use limited software copies in asset for the purpose
of business.• Keep your system secure – Check latest updated AV
Don’ts
• Download softwares from internet• Download open source software• Installing multiple copies of software• Use trial/freeware/shareware in production• Download software from blogs• Use development edition for commercial
purpose• Accessing malicious websites hosted open source
software