Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need to Have Your Software Licenses in Check

You Need to Have Your Software Licenses in Check

When you own a vehicle, you get a little document called a vehicle title. This certificate establishes the legal owner of the vehicle. When you own software, you are given a software license. Like any contract, things can go south if you violate the terms.

What’s a Software License?

We’re not lawyers, and we’re going to keep this in plain English. A software license is a contract that talks about the use or redistribution of a piece of software. It basically explains what you, the user, are allowed to do with the software and what your limitations are.

Think of software like any other medium, such as a novel, a song, a film, or a painting. If a novel is copywritten, it’s illegal to make copies and sell or otherwise distribute them. The publisher, whose job is to distribute and protect the author’s work, has every right to come after you for damages. The same goes for selling or publicly broadcasting someone’s music, or any other copywritten material. Software is no different - someone, or some entity, put a lot of time, money, and talent to build the software in order to distribute or sell it, and they have every right to control how that is done.

The software license grants limitations to the user as far as how many users can use the software. Although we don’t want to go too deep into all of the different rights and limitations that software licenses can have, there are some common categories most software falls into:

Public Domain

This software doesn’t have a copyright. It’s available for anyone to download, distribute, modify, and even sublicense out. This means you can take this software, change it however you want, and redistribute it. There aren’t a lot of famous examples of Public Domain software that we expect most of our readers to recognize, but one example is a portion of 7-Zip (a popular file compression tool) software is open and available for the world to use.

Free and Open Source

This software tends to be free, but “as a matter of liberty, not price.” The software could be free, or the developer could charge for it, but the license allows you to run the program however you want for any purpose, alter the software, redistribute the software, and distribute copies that you’ve modified. There are tons of famous examples, including the Linux operating system, the Firefox web browser, the software that Wikipedia is based on, and the Android operating system.

This type of license does a lot of good for the world, because it allows other developers to improve upon software (adding new features, customizations, or even making it safer) and make it available to the public.

Freeware/Shareware/Freemium

This category is for free (as in price) software. Unlike Free and Open Source software, however, the user doesn’t have the right to modify the software. Some famous examples of this type of software are Adobe PDF, WinZip, and the software for the game League of Legends.

Proprietary Licenses

Although you can’t really say this is the most common license for software, when it comes to commercial software, this is the license you usually run into. Proprietary software essentially means the copyright owner owns the software and you just have the right to use it. You can’t copy it, change it, or redistribute it in any way unless you get a specific license from the developer. Examples of this type of software are Microsoft Windows, macOS, Adobe Photoshop, and most commercial video games.

Trade Secret

Trade secret software tends to not be distributed the same way as most other software, and the portion of the software that is considered ‘trade secret’ doesn’t typically get installed on your device, or it’s installed on proprietary hardware that you don’t have a lot of control over. A lot of cloud-hosted software works this way. Think of the secret recipe for Coca-Cola, the inner workings of trade secret software is kept behind locked doors.

Why You Need to Audit Your Software Licenses

Your probably use a lot of software every day without thinking about it. You’ve got your workstation operating systems (typically Windows 10), your server operating systems, you likely use Microsoft Office or Adobe. Then there is your line of business app, your accounting/payroll software, inventory management, antivirus, your security camera software, software for your website, etc.

There are a lot of moving parts, and there are a lot of things to think about. For example, if a software license lapses, you might still be able to use that software, but you stop getting security updates and patches, which could leave you vulnerable.

It’s also critical to know your limitations with your software. For example, is the software restricted to the number of users it can use, or is it restricted to the number of devices it can be installed on? 

You Might Ask “Well How Will Anyone Know?”

You might think it doesn’t hurt anybody to share a piece of software that you purchased. You might pass over the installation files or let someone borrow the CD-ROM and think nothing of it. Unfortunately, this gesture could break your software license, and developers have several systems in place to identify it.

The Software Might ‘Phone Home’

Often, proprietary software will use the Internet to communicate to check for updates and check to validate the license. If it detects issues, it might deactivate the software or simply report back that something illegitimate is happening. 

The Software Might Require User Login

This method is becoming increasingly popular. If you log into the software on too many devices, it will deactivate on some of them based on the license. Basically, the software will prevent itself from being used across too many devices. 

Scary Whistleblower Programs

The arguably most nefarious solution that software developers have come up with is pitting your own employees or former employees against your business. The most famous (or infamous?) organization to come to mind is the Business Software Alliance (BSA). 

The BSA is an advocate for the software industry with a mission to help businesses protect the software they’ve developed. On the cover, it sounds like a good endeavor; after all, they strive to protect a business’ intellectual property. Unfortunately, they utilize some pretty sketchy tactics to do so.

The BSA has been known to market advertisements to people to encourage them to report their employer or former employer of misusing software licenses. The BSA even offers cash rewards and promises to keep the whistleblower anonymous. How do you feel about an organization targeting and bribing your employees to encourage them to report you? It’s just icky.

If your business gets reported, the BSA is relentless when it comes to sending cease and desists and forcing audits and threatening lawsuits. It’s just not a situation you want to find yourself in.

Don’t Risk It - Comply to Your Software Licenses

The first step is to audit all of the software you are using and get familiar with the software licenses. Document how many users and devices you can use it on, and what users and devices you are actually assigning the license to.

You’ll also want to document the purchase date of software, and if the software requires renewal, document that as well. Keep receipts and file them along with the rest of this documentation.

Any software that your company doesn’t need to operate should be uninstalled and removed from the network. It doesn’t hurt to make a list of exceptions too, for example, if you allow your employees to listen to music, allowing Spotify to be installed could be in your list of exceptions.

If you need assistance getting everything organized, the experts at Voyage Technology can help. Give us a call at 800.618.9844 to talk about protecting your business from unexpected software license violations.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 01 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Cloud Computing Covid-19 Gadgets Training Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Blockchain Virtualization Business Technology Wi-Fi Data Security Vendor Apps Managed Services Two-factor Authentication Mobile Office Mobile Device Management Networking Chrome Gmail Budget WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Voice over Internet Protocol Managed IT Services How To BDR HIPAA Physical Security Applications Access Control Computing Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Big Data Router Virtual Private Network Health 2FA Operating System Help Desk Computers Risk Management Retail Website Healthcare Cooperation Free Resource Firewall Project Management Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Solutions Social Display Going Green Printer Paperless Office Windows 11 Infrastructure Monitoring Customer Service Cybercrime Excel Document Management Remote Workers Managed IT Service Telephone Scam Data loss Outlook Entertainment Vulnerabilities Data Privacy Money Humor Images 101 Telephone System Multi-Factor Authentication Robot Mobility Safety Sports Cost Management Mouse Administration IT Management VPN Employees Meetings Integration User Tip Modem Processor Computer Repair Mobile Security Customer Relationship Management Settings Holidays Printing Wireless Data Storage Content Filtering Hacking Smart Technology Supply Chain Presentation YouTube Video Conferencing Machine Learning Managed Services Provider Cryptocurrency Saving Time Virtual Machines Professional Services Wireless Technology Virtual Desktop Maintenance LiFi Antivirus Downloads Data storage iPhone Licensing Word Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Refrigeration CES Halloween Tablet IoT Communitications Dark Web Cables Alert Public Speaking Trends Supply Chain Management Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Lithium-ion battery Hacks Data Analysis Entrepreneur Scary Stories Star Wars IT Assessment How To Microsoft Excel IT Maintenance Fun Notifications Staff Value Business Intelligence Gamification Flexibility Deep Learning Organization Travel Social Networking Legislation Shortcuts Undo Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Education Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Mobile Computing Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Search Wasting Time Threats Application Best Practice Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Buisness Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon IBM Legal IT solutions Username Business Growth Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Cortana Tech Support IT Technicians Virtual Machine Environment Media Network Management Alt Codes Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Competition Downtime Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Hosted Solution Typing Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Knowledge Chatbots Navigation Google Drive User Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider 5G Unified Communications Server Management Regulations Compliance Experience Private Cloud Identity Evernote Paperless IP Address Google Docs Bitcoin Superfish Bookmark Running Cable Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Google Wallet Download Net Neutrality Recovery Financial Data Error History Business Communications Hard Drives Windows 8 Browsers Smartwatch Laptop Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Domains Drones Upload Procurement

Blog Archive