Piracy: NCC hits end users

SECURITY

|
Image: By BiztechAfrica
Piracy: NCC hits end users

By Kokumo Goodie, Lagos, Nigeria

Officials from the Nigerian Copyright Commission (NCC) yesterday raided the head office premises of a well-known Estate Management Firm, Jide Taiwo & Co in Victoria Island, Lagos. The raid, which followed a tip off and undercover surveillance by the NCC, resulted in the seizure of suspected high quality counterfeit Microsoft software.

The usual clampdowns have been on channel distributors, but NCC is now focusing on end-users as well.

In the raid which lasted about 45 minutes, different Microsoft software suspected to be counterfeit was discovered. This included copies of the Microsoft Operating Systems Windows XP and Vista, Microsoft Office 2007 and Microsoft Office 2010.

Jide Taiwo & Co could also not provide the client access license for its Microsoft Windows 2003.

Some of the physical items taken away from the premises included media for Microsoft Office 2010, keys for Microsoft Windows XP, Microsoft Vista and Microsoft Windows 7. All these items have been sent to Microsoft's Ireland office for confirmation. An investigation into the matter is currently ongoing.

“Counterfeit software is a cankerworm that is eating through the fabric of societies all over the world. Its prevalence has a lot to do with the sophisticated and organised syndicates of pirates, but also can be traced to the demand for them,” said Augustine Amodu, Deputy Director of Enforcement at NCC.

“Consumers of pirated software must also realise that they will be punished for contravening the law and putting people’s livelihoods as well as the economy of the country as a whole at risk. To win this fight against copyright infringements, it must be a joint effort of regulators as well as consumers.”

As of 2011, PC software piracy rates in Nigeria stood at 82%, with around USD250 million lost to local businesses. Local Nigerian businesses have had difficulty competing with counterfeiters, who price their goods at below-market levels. 

“This enforcement action helps in getting consumers to understand the risk they are exposed to when they engage in the illegality of purchasing counterfeit software or mis-licensing software as a whole. It also helps to protect genuine business whose true purpose is to add value to the customer.” says Amodu.

Software piracy in organisations is often difficult to trace as the end users already have the software loaded on their systems, however, there is technology that makes detection possible and regulatory and enforcement authorities now rely on that to broaden their reach to the demand market. Counterfeit software also includes fake hologrammed CDs and fake Certificate of Authenticity labels that look like the real thing and which are sold as complete software packages.

“End users should be careful when purchasing software as the promises made saying there is no difference between the genuine and counterfeit are not true. Consumers looking for a bargain should know that the price you could pay in data loss or identity theft by using counterfeit software that is vulnerable to computer viruses, malware and hackers far outweighs the gains you have made from the difference in pricing.,” warned Ugochi Agoreyo, Anti-Piracy Manager for Microsoft Anglophone West Africa. “Many times, it’s just not worth the losses.”



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

Things to ask your MSSP to increase your network’s security

Arbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization. Read More

Unpacking penetration testing for SMEs

MWR Infosecurity outlines penetration testing best practice for SMEs. Read More

Separating the attack that matters from the noise

It has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds to the attack, that is how have they prepared for the breach and how do they communicate it?  Read More

Enhancing your security posture to fight new ransomware threats

Petya ransomware is proving to be one of the top cybersecurity stories of 2016.  Read More

Arbor stops malware in its tracks

There is always a substantial amount of banking trojan activity taking place, however, recent developments have intensified the threat landscape.  Read More

Networks Unlimited certifies Fortinet partners in East Africa

Value-added distributor, Networks Unlimited is intensifying its footprint in East Africa, training its partners and customers in the region to become certified. Read More

Understanding the risk and cost of a DDoS attack

Thw Arbor Networks white paper, The business value of DDoS protections, says a continuing and growing threat to service availability is distributed denial of service (DDoS) attacks.  Read More

Addressing the threat of cyber-crime in the digital era

Globally-connected cyber-attacks require globally connected and seamlessly integrated cyber defences. Read More

DDoS attacks: An operational risk that should be included in enterprise risk assessments

Today’s enterprises are increasingly motivated to formalise their IT security and place it firmly within the context of their enterprise risk management and business continuity planning.  Read More

Arbor Networks report finds relentless threat environment

Arbor Networks Inc., the security division of NETSCOUT (NASDAQ: NTCT), has released its 11th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from the global operational security community on a comprehensive range of issues. Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor Networks

FEATURED STORY

Government should encourage youths in ICT earlyGovernment should encourage youths in ICT early

Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.

IN DEPTH

IBM Opens First Cloud Data Centre in South AfricaIBM Opens First Cloud Data Centre in South Africa

IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.  

COMPANY NEWS

Things to ask your MSSP to increase your network’s security

Arbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization.

Networks Unlimited officially launches Mellanox Technologies Open Ethernet Solutions

Networks Unlimited, a value-adding distributor of converged technology, data centre, networking, and security technology throughout Africa, has hosted the official Johannesburg launch of Mellanox Technologies,