Piracy: NCC hits end users
SECURITY| June 14, 2012, 4:12 p.m.
By Kokumo Goodie, Lagos, Nigeria
Officials from the Nigerian Copyright Commission (NCC) yesterday raided the head office premises of a well-known Estate Management Firm, Jide Taiwo & Co in Victoria Island, Lagos. The raid, which followed a tip off and undercover surveillance by the NCC, resulted in the seizure of suspected high quality counterfeit Microsoft software.
The usual clampdowns have been on channel distributors, but NCC is now focusing on end-users as well.
In the raid which lasted about 45 minutes, different Microsoft software suspected to be counterfeit was discovered. This included copies of the Microsoft Operating Systems Windows XP and Vista, Microsoft Office 2007 and Microsoft Office 2010.
Jide Taiwo & Co could also not provide the client access license for its Microsoft Windows 2003.
Some of the physical items taken away from the premises included media for Microsoft Office 2010, keys for Microsoft Windows XP, Microsoft Vista and Microsoft Windows 7. All these items have been sent to Microsoft's Ireland office for confirmation. An investigation into the matter is currently ongoing.
“Counterfeit software is a cankerworm that is eating through the fabric of societies all over the world. Its prevalence has a lot to do with the sophisticated and organised syndicates of pirates, but also can be traced to the demand for them,” said Augustine Amodu, Deputy Director of Enforcement at NCC.
“Consumers of pirated software must also realise that they will be punished for contravening the law and putting people’s livelihoods as well as the economy of the country as a whole at risk. To win this fight against copyright infringements, it must be a joint effort of regulators as well as consumers.”
As of 2011, PC software piracy rates in Nigeria stood at 82%, with around USD250 million lost to local businesses. Local Nigerian businesses have had difficulty competing with counterfeiters, who price their goods at below-market levels.
“This enforcement action helps in getting consumers to understand the risk they are exposed to when they engage in the illegality of purchasing counterfeit software or mis-licensing software as a whole. It also helps to protect genuine business whose true purpose is to add value to the customer.” says Amodu.
Software piracy in organisations is often difficult to trace as the end users already have the software loaded on their systems, however, there is technology that makes detection possible and regulatory and enforcement authorities now rely on that to broaden their reach to the demand market. Counterfeit software also includes fake hologrammed CDs and fake Certificate of Authenticity labels that look like the real thing and which are sold as complete software packages.
“End users should be careful when purchasing software as the promises made saying there is no difference between the genuine and counterfeit are not true. Consumers looking for a bargain should know that the price you could pay in data loss or identity theft by using counterfeit software that is vulnerable to computer viruses, malware and hackers far outweighs the gains you have made from the difference in pricing.,” warned Ugochi Agoreyo, Anti-Piracy Manager for Microsoft Anglophone West Africa. “Many times, it’s just not worth the losses.”
MORE SECURITY NEWS
Things to ask your MSSP to increase your network’s securityArbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization. Read More
Unpacking penetration testing for SMEsMWR Infosecurity outlines penetration testing best practice for SMEs. Read More
Separating the attack that matters from the noiseIt has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds to the attack, that is how have they prepared for the breach and how do they communicate it? Read More
Enhancing your security posture to fight new ransomware threatsPetya ransomware is proving to be one of the top cybersecurity stories of 2016. Read More
Arbor stops malware in its tracksThere is always a substantial amount of banking trojan activity taking place, however, recent developments have intensified the threat landscape. Read More
Networks Unlimited certifies Fortinet partners in East AfricaValue-added distributor, Networks Unlimited is intensifying its footprint in East Africa, training its partners and customers in the region to become certified. Read More
Understanding the risk and cost of a DDoS attackThw Arbor Networks white paper, The business value of DDoS protections, says a continuing and growing threat to service availability is distributed denial of service (DDoS) attacks. Read More
Addressing the threat of cyber-crime in the digital eraGlobally-connected cyber-attacks require globally connected and seamlessly integrated cyber defences. Read More
DDoS attacks: An operational risk that should be included in enterprise risk assessmentsToday’s enterprises are increasingly motivated to formalise their IT security and place it firmly within the context of their enterprise risk management and business continuity planning. Read More
Arbor Networks report finds relentless threat environmentArbor Networks Inc., the security division of NETSCOUT (NASDAQ: NTCT), has released its 11th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from the global operational security community on a comprehensive range of issues. Read More
FEATURED STORYGovernment should encourage youths in ICT early
Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.
BEST READ NEWS
IN DEPTHIBM Opens First Cloud Data Centre in South Africa
IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.
COMPANY NEWSThings to ask your MSSP to increase your network’s security
Arbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization.Networks Unlimited officially launches Mellanox Technologies Open Ethernet Solutions
Networks Unlimited, a value-adding distributor of converged technology, data centre, networking, and security technology throughout Africa, has hosted the official Johannesburg launch of Mellanox Technologies,