1. Have employees and IT consultants sign confidentiality agreement.
2. Implement a process to retain and retrieve software purchase invoices.
3. Purchase software from authorized dealers. If the price is too good to be true, it probably is.
4. Conduct routine discovery on all desktops, laptops, and servers.
5. Apply appropriate electronic controls to prevent unauthorized software-title proliferation.
If a company should receive a letter from the BSA or the Software & Information Industry Association (SIIA), it is usually best to avoid using the free tools these trade associations provide because more often than not, their tools fail to exclude information outside the scope of the audit request. Audited companies that enlist experienced counsel to guide them through the process and avoid common mistakes have the best chance for the most cost-effective outcome.
# # #
For the original version on PRWeb visit: http://www.prweb.com/releases/prweb2012/8/prweb9846092.htm