COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.

Slides:



Advertisements
Similar presentations
I Choose Privacy! Intellectual Freedom: Addressing the Privacy Issue in the Academic Library.
Advertisements

Massachusetts Department of Elementary & Secondary Education
IMPORTANT READ CAREFULLY BEFORE USING THIS PRODUCT LICENSE AGREEMENT AND LIMITED WARRANTY BY INSTALLING OR USING THE SOFTWARE, FILES OR OTHER ELECTRONIC.
Review Questions Business 205
The Bill of Rights, 2nd and 4th Amendments
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
Intellectual Property (IP) GE 105 Introduction to Engineering Design.
Copyright Laws and Software By Shana Jenkins Carol Dickinson Brittany Caldarulo Sarah Hunkeler.
Standards and Guidelines for Web Page Publishing December 9, 2009.
4th Amendment.
Legal Case Studies November 8,  1 st Amendment to US Constitution  4 th Amendment to US Constitution  Tinker vs. Des Moines.
Intellectual Property GE 105 Introduction to Engineering Design.
INSPECTIONS AND SEARCHES PREPARATION AND RESPONSE Richard E. Glaze, Jr. Balch & Bingham LLP Atlanta, GA AWMA August 3, 2011.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
Introduction to Constitutional Law Unit 4. CJ140-02A – Introduction to Constitutional Law Unit 4: The Fourth Amendment CJ140-02A– Class 4 Part 1.
SS4H5 The student will analyze the challenges faced by the new nation.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
Unit The Bill of Rights n First ten amendments to the U.S. Constitution. n Purpose is to prevent government from usurping the personal freedom of.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
It really is easier that you think!. Why use learning objectives  If you don't know where you are going, any road will take you there.  Lewis Carroll,
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Bill of Rights.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Psychology of Homicide Unit II
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Civil Law. Law that governs private property, contracts and disputes involving individuals and businesses.
The Bill of Rights The First Fundamental Changes of the Constitution.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
Legal Stumbling Blocks When Rescue and Law Enforcement Collide Gillian Deegan Assistant Commonwealth’s Attorney Botetourt County VA.
A Constitutional Rights Activity TM. What is a right? TM.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
The Bill of Rights and the Criminal Trial Process.
Generally Accepted Recordkeeping Principles: The Principle of Transparency Alaska Chapter of ARMA International Presented by: Tara Carey, ARMA Board Member.
COPYRIGHT CLEARANCE PROCEDURE. LEGAL SERVICES COPYRIGHT ACT The Copyright Act no. 98 of 1978 governs the use of copyright protected works – those works.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
Due Process Amendments What is due process? Due process, for the people of the United States, refers to how laws are enforced why laws are.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
First 10 Amendments to the United States Constitution.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
Proposed Best Practices For Public Art Projects Approved October 2015 | Revised January 2016.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Privacy and the Law.
Limiting the Right of Search
Due Process: Due process is a judicial constitutional guarantee that no judgment can be made without a just legal proceeding. The Constitution guarantees.
Amendments in Action Search and Seizure.
Criminal Investigation and the Law
Forensics Week 7.
The Bill of Rights and the Criminal Trial Process
The American Court Structure
Due Process deals with the administration of justice and thus the due process clause acts as a safeguard from arbitrary denial of life, liberty, or property.
Understanding Law: Mr Thompson, APT Academy
Amendments in Action Search and Seizure.
Fourth Amendment.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
The Bill of Rights and the Criminal Trial Process
Authority to Detain and Arrest; Use of Force
Search & Seizure The act of taking possession of this property.
Search & Seizure in Schools:
How does this Constitutional amendment protect Americans?
Baltimore Police Department & CitiWatch
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by the respective owner(s). We are making such material available in our efforts to educate the audience on the issues surrounding copyright law as it pertains to software usages and End User License Agreements. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material in this presentation is presented to those who have expressed a prior interest in receiving the included information for research and educational purposes.

Inventory as Armor Defending your Business with Knowledge

Inventory as Armor Presented by Vern Graner, CSAM Senior Systems Engineer & Compliance Officer Integrity Software Inc. Defending your Business with Knowledge

Definition of Terms* in·ven·to·ry - n. A detailed, itemized list, report, or record of things in one's possession, especially a periodic survey of all goods and materials in stock. The process of making such a list, report, or record. The items listed in such a report or record. * source:

Definition of Terms* ar·mor - n. A defensive covering, as of metal, wood, or leather, worn to protect the body against weapons. A safeguard or protection * source:

Why do you need protection?

For defending against Threats.

#1 Threat: BSA

No, not them..

The Business Software Alliance #1 Threat!

“Benevolent” They educate the public, they partner with high-profile vendors

Some of the many BSA members: (Do you use products from any of these companies?)

They work with the Government

Prosecuting Pirates! Protecting consumers!

The BSA is an RGO! (Revenue Generating Organization) They locate “pirates” and collect monetary fines on behalf of their members.

How is the BSA a danger to your business?

Employees = Informants? These “reward” offers don't really work.. do they?

$144,000 in March 2010

$400,000 in August 2010

$275,000 in October 2010

How can they do that !? The BSA is not a government organization! Don't I have rights?

“Its the Law” Amendment the 4th: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

“Its the Law” Amendment the 4th: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. WAIVED!

The End User License Agreement or “EULA” is a binding, legal contract between you and the software vender.

Next.. Next.. I AGREE.. Next.. Not many folks actually read this stuff...

Look closely at the EULA! What, exactly, have you agreed to?

By clicking “I AGREE”: “20. Verification/Audits. On Licensor's reasonable request, You will furnish Licensor with a signed statement confirming whether the Software is being used by You in accordance with this Agreement. Further during the term of this Agreement and for one (1) year thereafter, Licensor may, upon five (5) business days advance written notice to You, audit You for the purpose of verifying Your compliance with this Agreement. You understand and agree that the audit may take place in person or Licensor may use technological means to perform such audit. You agree to provide Licensor will all reasonable assistance required hereunder.”

The law is on THEIR side! They can, and do, walk right in and gather evidence to use against you!

The Business Software Alliance Benevolent?

The Business Software Alliance Don't be so sure...

Scared yet? (If not, then you haven't been paying attention!)

Inventory as Armor Defending your Business with knowledge

Protection, by the numbers:

1) Have a CLEAR, updated, enforced A.U.P. (Acceptable Use Policy)! -Make sure all employees understand and follow it! -Make sure all management understands and follows it -Company computers are not personal computers!

Protection, by the numbers: 2) COLLECT INVENTORY! -Collect and maintain an inventory of all hardware and software products that may subject you to fines for copyright infringement -Inventory maintenance is a process (ongoing) not as a one- time procedure

Protection, by the numbers: 3) RECONCILE INVENTORY REPORTS WITH RECEIPTS! -Compare all discovered software with purchase records! -Track down new software installs and verify the ownership!

Protection, by the numbers: 4) WATCH FOR CHANGES -Unauthorized software installations can create infringement! -New versions of products may or may not be covered by existing licenses

Protection, by the numbers: 5) KEEP PROOF OF PURCHASE -Don't allow employees to “accidentally” discard receipts! -Make sure your record retention / destruction policy exempts your proof of purchase records!

Protection, by the numbers: 6) REMOVE UNAUTHORIZED SOFTWARE -Watch for, and remove, employee-owned applications (Laptops?) -”Shareware” and “Free” may not be! -Not just software- music too!

Protection, by the numbers: 7) The Letter L ;)

Inventory = Painting a battleship

Regular inventory collection, combined with purchase reconciliation, keeps you in compliance! Companies in compliance are much more likely to get to keep their money!

Inventory as Armor Integrity Software, makers of SofTrack and Quick Inventory can be reached via the web at SoftwareMetering.com or by phone at Presented by Vern Graner, CSAM Senior Systems Engineer & Compliance Officer Integrity Software Inc.