5 Steps To Stay Compliant
5 Steps To Stay Compliant
5 Steps To Stay Compliant
If you can't fully invest in IT asset management tools, there are alternative measures you
can take to control the installation of unauthorized software on your PCs.
© 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior
written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable.
Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no
liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader
assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed
herein are subject to change without notice.
WHAT YOU NEED TO KNOW
License management is a comprehensive process that begins with upfront contract negotiation.
Wherever possible, attempt to remove the audit clauses from your contracts and pass the burden
and cost to the vendor. This alone this will not prevent the proliferation of inappropriate use of
licenses. Documenting corporate policies, maintaining a media library of approved applications
and implementing lockdown, policy-based management and embedded license keys are steps
that can assist enterprises with software compliance without embarking on a comprehensive IT
asset management initiative.
ANALYSIS
Given the array of software vendors and the myriad licensing terms and conditions available, it's
no wonder that software license compliance continues to be a perpetual driver for IT asset
management programs. However, knowing what you have installed and have the right to use is
difficult in environments that do not have controls in place to prevent users from making
unauthorized changes. Vendors retain the right to audit their customers, and they endorse third-
party companies (such as the Business Software Alliance, the Federation Against Software Theft
and the Software Information Industry Association) that generate revenue from enterprises that
need to purchase additional licenses to pay for licenses that they may have installed but have not
yet purchased. However, these audit clauses are expensive to exercise, from both the vendor
and customer perspectives. Additionally, audits antagonize customers that don’t have IT asset
management programs and can’t afford the time or the resources to respond to them.
Recognizing the risks, enterprises attempt to mitigate the effects of software audits by:
• Putting corporate policies in place around ad hoc purchasing and the use of corporate
assets
• Negotiating better audit and use terms upfront to minimize the cost of an audit
A combination of these methods can control the computing environment more tightly and reduce
unforeseen compliance expenses. There are several steps you can take to control your software
environments without investing in a full-fledged IT asset management program.
1. Develop corporate policies that define approved uses of IT assets.
It is imperative that you have a standard policy to control the introduction of unlicensed software
into the corporate environment. Take into account how employees use IT assets and create a
policy stating that employees have a legal obligation not to expose the company to any
compliance risk, whether knowingly or through casual piracy. The policy should clearly state that
only authorized, purchased, licensed software that is approved by the IS organization can be
installed and used on corporate systems.
Additionally, software, even if it is already licensed to a specific system, cannot be shared
between computers, because this may be a violation of the licensing agreement. Employees
mistakenly believe that because the application has been paid for they can install it on all of the
systems they use, including a home computer that is occasionally used for work purposes. Often,
we have seen cases where the licensing agreement "fine print" on downloadable or off-the-shelf
Key Issues
How will IT asset management evolve into a core IT management practice?
REGIONAL HEADQUARTERS