Microsoft, Adobe Top U.K. Software Piracy List - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Enterprise Architecture
11:57 AM

Microsoft, Adobe Top U.K. Software Piracy List

Windows, Office, and Photoshop are most commonly pirated apps, according to new study.

The two companies that are most often subject to software piracy in Britain, according to the Federation Against Software Theft (FAST), are Microsoft and Adobe.

The software that's most commonly installed without a license in the U.K. is Microsoft Office (24%) and Windows (24%), followed by Adobe Photoshop, Illustrator (16%) and Creative Suite (10%). Other commonly pirated programs include 3D design suite Solidworks and SQL, both at 6%, Quark and AutoCAD, both at 4%, Virtual DJ and Corel Draw, at 2%.

FAST is a non-profit organization of software publishers set up in 1984 to champion the professional management of legitimate software and protect publishers' intellectual property rights. This is the first time it has released information on its casework and enforcement activity.

FAST has been conducting research over the past year based on legal cases and reports collected by whistle-blowers in 2012. The findings represent all cases – those in progress, awaiting action and closed.

[ Does international tax law need an overhaul? Read Debate Grows Over Big Tech Taxes. ]

Michala Wardell, head of anti-piracy at Microsoft U.K., noted that software piracy and efforts to illegally profit from pirated software have become increasingly sophisticated and that Microsoft has had to evolve its technology and tactics in order to protect its IP and its customers.

She also pointed out that businesses that use pirated software frequently run into a host of problems, such as identity theft and credit card fraud. They then have to spend many hours trying to reverse the impact the counterfeit software has had on their business. "We remind customers to play it safe, ask questions, investigate packaging, watch for too-good-to-be-true prices and demand genuine software to ensure business get what they pay for," Wardell said. For FAST general counsel Julian Heathcote Hobbins, the issue is less deliberate theft on the part of enterprises than just bad practice. "The corporate end user is often left in a vulnerable position being an automatic infringer and not party to support," he said. "There is a more general risk that if the copy is from an unauthorized Internet resource, the software may be incomplete or virus-contaminated."

Heathcote Hobbins pointed out that unlicensed software can also come in via the supplier route. "Unscrupulous computer system builders can dupe unsuspecting customers using their computer skills to install unlawful copies on computers," he warned. "[That means] the system builder gets paid but the brand owner does not."

IT finally has its security priorities right, our annual survey shows. Also in the new, all-digital Strategic Security issue of InformationWeek: Five counterintuitive insights on innovation from our recent CIO Summit. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Pandemic Responses Make Room for More Data Opportunities
Jessica Davis, Senior Editor, Enterprise Apps,  5/4/2021
10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Transformation, Disruption, and Gender Diversity in Tech
Joao-Pierre S. Ruth, Senior Writer,  5/6/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll