Government // Enterprise Architecture
News
5/28/2013
11:57 AM
Connect Directly
RSS
E-Mail
50%
50%

Microsoft, Adobe Top U.K. Software Piracy List

Windows, Office, and Photoshop are most commonly pirated apps, according to new study.

The two companies that are most often subject to software piracy in Britain, according to the Federation Against Software Theft (FAST), are Microsoft and Adobe.

The software that's most commonly installed without a license in the U.K. is Microsoft Office (24%) and Windows (24%), followed by Adobe Photoshop, Illustrator (16%) and Creative Suite (10%). Other commonly pirated programs include 3D design suite Solidworks and SQL, both at 6%, Quark and AutoCAD, both at 4%, Virtual DJ and Corel Draw, at 2%.

FAST is a non-profit organization of software publishers set up in 1984 to champion the professional management of legitimate software and protect publishers' intellectual property rights. This is the first time it has released information on its casework and enforcement activity.

FAST has been conducting research over the past year based on legal cases and reports collected by whistle-blowers in 2012. The findings represent all cases – those in progress, awaiting action and closed.

[ Does international tax law need an overhaul? Read Debate Grows Over Big Tech Taxes. ]

Michala Wardell, head of anti-piracy at Microsoft U.K., noted that software piracy and efforts to illegally profit from pirated software have become increasingly sophisticated and that Microsoft has had to evolve its technology and tactics in order to protect its IP and its customers.

She also pointed out that businesses that use pirated software frequently run into a host of problems, such as identity theft and credit card fraud. They then have to spend many hours trying to reverse the impact the counterfeit software has had on their business. "We remind customers to play it safe, ask questions, investigate packaging, watch for too-good-to-be-true prices and demand genuine software to ensure business get what they pay for," Wardell said. For FAST general counsel Julian Heathcote Hobbins, the issue is less deliberate theft on the part of enterprises than just bad practice. "The corporate end user is often left in a vulnerable position being an automatic infringer and not party to support," he said. "There is a more general risk that if the copy is from an unauthorized Internet resource, the software may be incomplete or virus-contaminated."

Heathcote Hobbins pointed out that unlicensed software can also come in via the supplier route. "Unscrupulous computer system builders can dupe unsuspecting customers using their computer skills to install unlawful copies on computers," he warned. "[That means] the system builder gets paid but the brand owner does not."

IT finally has its security priorities right, our annual survey shows. Also in the new, all-digital Strategic Security issue of InformationWeek: Five counterintuitive insights on innovation from our recent CIO Summit. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Must Reads Oct. 21, 2014
InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and community news at InformationWeek.com.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.