Piracy: NCC hits end users
SECURITYBy BiztechAfrica - June 14, 2012, 4:12 p.m.
By Kokumo Goodie, Lagos, Nigeria
Officials from the Nigerian Copyright Commission (NCC) yesterday raided the head office premises of a well-known Estate Management Firm, Jide Taiwo & Co in Victoria Island, Lagos. The raid, which followed a tip off and undercover surveillance by the NCC, resulted in the seizure of suspected high quality counterfeit Microsoft software.
The usual clampdowns have been on channel distributors, but NCC is now focusing on end-users as well.
In the raid which lasted about 45 minutes, different Microsoft software suspected to be counterfeit was discovered. This included copies of the Microsoft Operating Systems Windows XP and Vista, Microsoft Office 2007 and Microsoft Office 2010.
Jide Taiwo & Co could also not provide the client access license for its Microsoft Windows 2003.
Some of the physical items taken away from the premises included media for Microsoft Office 2010, keys for Microsoft Windows XP, Microsoft Vista and Microsoft Windows 7. All these items have been sent to Microsoft's Ireland office for confirmation. An investigation into the matter is currently ongoing.
“Counterfeit software is a cankerworm that is eating through the fabric of societies all over the world. Its prevalence has a lot to do with the sophisticated and organised syndicates of pirates, but also can be traced to the demand for them,” said Augustine Amodu, Deputy Director of Enforcement at NCC.
“Consumers of pirated software must also realise that they will be punished for contravening the law and putting people’s livelihoods as well as the economy of the country as a whole at risk. To win this fight against copyright infringements, it must be a joint effort of regulators as well as consumers.”
As of 2011, PC software piracy rates in Nigeria stood at 82%, with around USD250 million lost to local businesses. Local Nigerian businesses have had difficulty competing with counterfeiters, who price their goods at below-market levels.
“This enforcement action helps in getting consumers to understand the risk they are exposed to when they engage in the illegality of purchasing counterfeit software or mis-licensing software as a whole. It also helps to protect genuine business whose true purpose is to add value to the customer.” says Amodu.
Software piracy in organisations is often difficult to trace as the end users already have the software loaded on their systems, however, there is technology that makes detection possible and regulatory and enforcement authorities now rely on that to broaden their reach to the demand market. Counterfeit software also includes fake hologrammed CDs and fake Certificate of Authenticity labels that look like the real thing and which are sold as complete software packages.
“End users should be careful when purchasing software as the promises made saying there is no difference between the genuine and counterfeit are not true. Consumers looking for a bargain should know that the price you could pay in data loss or identity theft by using counterfeit software that is vulnerable to computer viruses, malware and hackers far outweighs the gains you have made from the difference in pricing.,” warned Ugochi Agoreyo, Anti-Piracy Manager for Microsoft Anglophone West Africa. “Many times, it’s just not worth the losses.”
MORE SECURITY NEWS
2014 Banking and ICT summits pegged for Uganda, Zambia and EthiopiaCyber Security Africa has announced that its 2014 Banking and ICT summits will be hosted in Uganda, Zambia and Ethiopia. Read More
Security in 2014: Money and MayhemIT security stands at the frontier of a fight for wealth and information, says Andrew Kirkland, Regional Director Africa, Trustwave. Read More
McAfee delivers on Intel vision of free mobile securityMcAfee has announced details of free protection for consumers on any Android and iOS mobile device. Read More
Botswana financial institutions exposed to cyber crimeBotswana’s financial institutions face a growing risk of cyber fraud, says BIC MD Dziki Nganunu. Read More
New Android threat risesThe AndroRAT is an example of how cyber criminals can manipulate apps for their own gain, says Intact Security. Read More
Arbor Networks partners with Networks Unlimited in SSAArbor Networks has announced a new partnership with Networks Unlimited to help organisations better mitigate and defend against the growing DDoS threat to their customers’ businesses. Read More
Trend Micro’s 2013 threat roundup highlights private data profitabilityAccording to Trend Micro Incorporated’s 2013 annual threat roundup report, “security breaches, cyber criminals, and organised attacks made it nearly impossible to keep personal and financial data private. Read More
Hardcore goons use mobiles to scare, extort KenyansHardcore criminals in prison are reported to be using mobile phones to extort money and scare Kenyan civilians. Read More
Phone scammers back in businessMicrosoft has warned of scam artists who defraud PC users by pretending to work for Microsoft. Read More
ADT, McAfee study finds parallels between physical, digital securityMcAfee has released the results of a survey that takes a look at the important parallels between personal and online security. Read More
FEATURED STORYMACRA demystifies spectrum management
Malawi's regulator explains the issues around spectrum allocation. Gregory Gondwe reports.
BEST READ NEWS
IN DEPTHYouthConnekt launches Mobile Apps for Human Development Challenge in Rwanda
Rwanda’s Ministry of Youth and ICT and the UNDP, in close collaboration with Motorola Solutions, will power a Mobile App Challenge that will be implemented by YouthConnekt.