SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
AUTODESK®




LICENSE COMPLIANCE

Software Asset
Management
Toolkit




IS YOUR
SOFTWARE
LEGAL?
Make sure your original
ideas get original software.
TO USE AND CUSTOMIZE THESE TEMPLATES
FOR YOUR ORGANIZATION, DOWNLOAD THE
SOFTWARE ASSET MANAGEMENT TOOLKIT
FROM WWW.AUTODESK.COM/PIRACY.
HOW TO USE THE SOFTWARE ASSET
MANAGEMENT TOOLKIT
          Software piracy is a widespread problem        • Establish a budget.
          that affects everyone. Many companies          • Put in place a process to account for your
          who use unauthorized software simply             software inventory.
          have poor software management policies
          and fail to budget for additional software     • Take appropriate steps if you discover
          resources. To support your efforts to             unauthorized copying.
          remain compliant, Autodesk offers informa-     • Be consistent with your organization’s
          tion, purchase options such as subscription,     policy and with the law to ensure that any
          and software management tools to help            problems are corrected and not repeated.
          you audit your PCs and maintain control
          over software licenses.                        Good planning and budgeting, and a well-
          The easiest way to keep Autodesk design
                                            ®            documented policy that is regularly com-
          tools up-to-date is through Autodesk           municated companywide, are the keys to
          Subscription. For an annual fee, the           managing software and avoiding situations
          program provides the latest versions of        where employees may be tempted to copy
          licensed Autodesk software and other ben-      software illegally. Use the following tem-
          efits, offering a budget-conscious way to      plates, which are included in this toolkit, to
          stay current with the latest technology.       get started:
          For more information about Subscription,       • Company Software Policy
          visit www.autodesk.com/subscription.
                                                         • Software Code of Ethics
          This toolkit provides guidelines and tem-
                                                         • Software User Profile
          plates to help you ensure the legal and
          ethical use of software in your organization   • Software Budget Planning
          by removing the causes of illegal software     • Software Register (Electronic and Manual)
          copying. Your company can achieve suc-
          cessful software management by using only      • Employee Memorandum
          licensed products and enforcing compli-        • Checklist
          ance companywide.
                                                         Because organizations have different needs,
          First, follow these guidelines and then use    you can customize these documents as
          the templates to execute your plan.            necessary. The following sections review
          • Establish a program of regular software      the use of each template in detail.
            audits to ensure that your company is
            always in compliance with the law.
          • Profile each computer and user in your
            company.
Company Software                                the most effective use of their personal
                                                computers. Record your findings on the en-
                                                                                                  and software capabilities change, software
                                                                                                  also needs to change. Keep your organiza-
Policy                                          closed Software User Profile form. Typical        tion’s software profiles current by review-
Prominently post a notice that states your      software profiles include operating system        ing them on a regular basis or by putting
organization’s policy about software use        software and programs for word process-           them on subscription. For a fixed annual
and the consequences of violating that          ing, spreadsheets, communications, and            fee, subscription is a budget-conscious way
policy wherever employees congregate,           database management. Your users may also          to stay current with the latest technology.
such as a kitchen or hallway. You can use       need computer-aided design and desktop            Make a plan that includes surveying your
the Company Software Policy template            publishing packages, as well as utilities and     employees at least once a year. This may
included in this toolkit for this purpose.      programming languages.                            highlight the need to acquire new programs
                                                                                                  or new releases of existing software. It may
Designate a person to be responsible for        The Software User Profile is designed as
                                                                                                  also permit specific departments in your
ensuring proper software use throughout         a discovery tool, that is, a way to determine
                                                                                                  organization—to the extent permitted by
the organization. Typically, this person is     what software your employees need, not
                                                                                                  license agreements—to distribute software
the manager of IS (information systems),        what they currently have. To list the soft-
                                                                                                  they no longer use to other departments.
EDP (electronic data processing), or CAD        ware on each employee’s hard drive, use
(computer-aided design). An attorney,           the Software Register.
financial officer, or accounting professional   2. Deliver needed software to users in a          Software Budget
inside or outside your organization can also    timely manner. If original software is avail-     Planning
play this role.                                 able in principle, but acquisition is bureau-
                                                                                                  With every new year comes budgeting
                                                cratic, slow, or unduly restrictive, your users
                                                                                                  responsibilities. It is essential to establish
Software Code                                   are being deprived of the software they
                                                need to be productive. Frustration may
                                                                                                  realistic budgets for both hardware and
of Ethics                                       cause these users to resort to unauthorized
                                                                                                  software. Many organizations believe
                                                                                                  they can take financial shortcuts to pay for
Communicate your organization’s com-            copying. Ensure that your organization can
                                                                                                  software—a practice virtually unheard of for
mitment to using only licensed software.        put software into employees’ hands when
                                                                                                  hardware acquisitions.
Have people in your organization sign the       they need it.
enclosed Software Code of Ethics, or a simi-                                                      Software acquisition sometimes seems to
                                                3. As an organization, commit to supplying
lar statement, and post copies of the Code                                                        be neglected in budget spreadsheets. Most
                                                original software to meet the needs of all
throughout your organization.                                                                     companies can afford to buy the software
                                                your users. Ensure that your organization
                                                                                                  they need, but some believe they can avoid
                                                acquires a full range of original software,
                                                                                                  the expense simply by copying licenses
Software User                                   that is, programs in a form fully authorized
                                                                                                  onto additional computers. This practice is
                                                by license or purchase terms, in quantities
Profile                                         proportionate to the number of computers
                                                                                                  in fact illegal and violates software copy-
                                                                                                  right laws. In an era where unethical cor-
1. Assess your organization’s software          in use. These quantities should meet the
                                                                                                  porate behavior is gaining a lot of negative
needs and identify the appropriate soft-        requirements of each user’s profile.
                                                                                                  press, companies using unlicensed software
ware profile of each computer or user.          4. Anticipate reasonable user needs and           are risking their reputation by acting in an
Survey PC users in your organization to de-     plan to meet them. As organizations, users,       unethical and illegal fashion.
termine what software they need to make
Smart companies protect themselves by           using information such as location and           companies, courts have often granted
budgeting for software needed for exist-        authorized user, and it lists the software       search warrants that permit surprise in-
ing employees as well as for upturns in         authorized for use on that computer. A           spections of organizations suspected of
their business that may require additional      software register can be a focal point not       using unauthorized software.
software resources during the year. The         only for planning software use but also for      2. Be ready for any surprise inspection
best managers are prepared for unforeseen       monitoring to ensure that only licensed          by conducting your own first. According to
expenditures.                                   software is used. In addition to the soft-       Autodesk’s end-user license agreement,
                                                ware register, you should also maintain eas-     “To ensure compliance with this Agree-
Software Register                               ily accessible files with the actual software
                                                license agreements, invoices, and other
                                                                                                 ment, you agree that upon reasonable
                                                                                                 notice, Autodesk or Autodesk’s authorized
Once you have completed the Software            documents showing that the software has          representative shall have the right to
Budget Planning and Software User Profile       been acquired legally. Returning registra-       inspect and audit your installation, access
forms, follow these steps using the Soft-       tion cards to software companies facilitates     and use of the software.” Various computer
ware Register.                                  this process and provides other benefits as      programs, ranging from batch files that run
1. Electronically track Autodesk software       well. For example, the benefits of regis-        in disk operating systems to full-featured
through the Autodesk Network License            tering Autodesk products include timely,         utilities, can be used to identify the pro-
Manager and Autodesk Product Manager.           low-cost upgrades, access to new product         grams on a computer hard drive. Special
To efficiently track Autodesk software,         information, and notification of important       audit software is also available. Many
Autodesk has incorporated features such as      product changes. You can also use the            auditing firms have made software audits
the Network License Manager and the Au-         software register to track stand-alone and       part of their routine financial audit. Consult
todesk Product Manager. Network licens-         subscription-based licenses. With subscrip-      your auditing firm for more information.
ing provides features to ensure that users      tion-based licenses, it is easier to remain
have access to the software they need.          compliant, budget for software on an an-
Products based on AutoCAD software offer
                             ®                  nual basis, and ensure that everyone has
a Network License Manager feature that          the latest software.
includes network license borrowing with
check-in and check-out capabilities. The        Employee
Network License Manager also provides a
Network License Timeout feature that frees      Memorandum
idle licenses for cost-effective usage across   Follow up with a memo to your employees
the organization. In addition, AutoCAD-         by using the Employee Memorandum tem-
based products offer the Autodesk Product       plate to reinforce your company policy.
Manager, a software inventory tool to
                                                1. Inspect the software that is actually
improve asset tracking.
                                                in use to ensure that all programs are legiti-
2. Manually track all software acquisitions     mately acquired originals, duly accounted
in a software register. Use the enclosed        for in the Software Register. Inspections
Software Register form for this purpose. A      are most effective when conducted without
software register identifies each computer      prior notice. In legal actions by software
TEMPLATES
COMPANY SOFTWARE POLICY
1. <Insert company or organization name> licenses the use of computer software from a variety
of outside companies. <Insert company or organization name> does not own this software or
its related documentation and, unless authorized by the software developer, does not have
the right to reproduce it.
2. With regard to use on local area networks or multiple machines, <Insert company or organi-
zation name> employees shall use the software only in accordance with the license agree-
ment.
3. <Insert company or organization name> employees learning of any misuse of software or
related documentation within the Company shall notify the department manager or <insert
company or organization name> legal counsel.
4. According to the U.S. Copyright Law, persons involved in the illegal reproduction of soft-
ware face civil damages of as much as US$150,000, and criminal penalties, including fines
and imprisonment. <Insert company or organization name> does not permit the illegal duplica-
tion of software. <Insert company or organization name> employees who make, acquire, or
use unauthorized copies of computer software shall be disciplined accordingly and may be
subject to termination.
I,                                              , am fully aware of the software-use policies
of <Insert company or organization name> and agree to uphold them.




Signed




Dated
SOFTWARE CODE OF ETHICS                                                                         (Developed by the
                                                                                                Business Software Alliance)

Unauthorized duplication of copyrighted computer software violates the law and is contrary
to our organization’s ethical standards. We disapprove of such copying and will apply the
following principles to prevent its occurrence.

• We will neither commit nor tolerate under any circumstances the creation or use of un-
  authorized software copies.

• We will provide, in a timely fashion, legitimately acquired software to meet all software
  needs and in sufficient quantities for all our computers.

• We will comply with all license terms regulating the use of any software we acquire or use.

• We will enforce strong internal controls to prevent the creation or use of unauthorized
  software copies, including effective measures to verify compliance with these standards
  and appropriate disciplinary actions for violation of these standards.




<signature of organization President>




<insert name and title of organization President>



<insert organization name>
SOFTWARE USER PROFILE
User name

Date

Job title


User requires software for the functions outlined in the following table:

	 Used	For		          Application	Name		      Brief	Rationale	for	Installation	of	Each	Program

 Database
 Management

 Word
 Processing

 Spreadsheets

 CAD

 Desktop
 Publishing

 Utilities

 Communications

 Programming
 Language

 Other
SOFTWARE BUDGET PLANNING
Proper budget planning is key to sound software management. It enables all employees
to have the tools they need to be productive. It allows for unforeseen increases in resources
throughout the year. It establishes a known budget for software for the year. And it eliminates
piracy risks. Following is a sample spreadsheet to calculate your annual software budget.



Annual	Budget	Request

	 Vendor	             Product/Service		               Cost			   Notes




 Total                                                 $$$
SOFTWARE REGISTER:
ELECTRONIC TRACKING
AutoCAD-based products offer flexible            Refer to your Autodesk software user
network license management capabilities          manual for details on installing the Network
such as the Network License Borrowing and        License Manager and using the License Bor-
Network License Timeout features.                rowing and License Timeout features.


Network License                                  Autodesk Product
Borrowing                                        Manager
If your Autodesk product supports the            A common problem in an office is not
License Borrowing feature, you can use the       knowing exactly what software is installed
                                                                                                1. To conduct a search, from the File menu,
Options file to configure license borrowing      throughout the network. To resolve this
                                                                                                   choose New Search. A dialog box provides
options. For example, you can define the         problem, Autodesk has incorporated
                                                                                                   a list of products to locate and computers
maximum number of licenses that cannot           a software inventory tool called Autodesk
                                                                                                   to search.
be borrowed from your network at any one         Product Manager into all AutoCAD-based
time. In addition, you can define which us-      software.                                      2. Name your search in the space provided.
ers can borrow an Autodesk product license.
                                                 The Autodesk Product Manager is included       3. Under Products to Search, select the
(If your Autodesk product supports license
                                                 as part of the Autodesk CAD Manager Tools         Autodesk software you want to search
borrowing, and licenses are borrowed from
                                                 for improved asset tracking. It compiles          for.
a redundant license server pool, you must
                                                 a report that lists the Autodesk software
restart the license server after you stop the                                                   4. Under Computers to Search, you will see
                                                 installed on the computers in the network.
Network License Manager.) At the end of a                                                         a list of available network computers.
                                                 Use the Autodesk Product Manager to in-
borrowing period, the borrowed license is                                                         Highlight your choice, and click the right
                                                 ventory your licenses and keep track of who
automatically disabled on the user’s com-                                                         arrow to move it to the Computers Added
                                                 is using them. The tool reports the applica-
puter and becomes available again on the                                                          to Search pane.
                                                 tion version, serial number, service pack
license server. Users can return a license
                                                 level, machine name, and more. By perform-     Later you can open an existing search,
before a borrowing period has ended.
                                                 ing an inventory of installed Autodesk soft-   modify a search, print a report, or export
                                                 ware on a PC, LAN, or WAN from a single        a report—all from the File menu. From the
Network License                                  location, the Autodesk Product Manager en-     Search menu, you can run, pause, or clear a
Timeout                                          ables the CAD or IT manager to easily keep
                                                 track of installed software assets, ensure
                                                                                                search.

The License Timeout feature enables you to       maximum return on technology investment,
determine how long a product session can         and avoid excess software purchases.
be idle before the license server reclaims
the license. When you set this flag, the
license server reclaims a license if the prod-
uct is idle on a workstation for more than
a specified time. If a user’s license is lost
because of the idle timeout, the product at-
tempts to claim a new license once the user
accesses the product again. If no license is
available, the user can save work before the
product shuts down.
SOFTWARE REGISTER:
MANUAL TRACKING
Name of authorized user:

Job title:



	 Used	For          Application   Serial   Price	   Location	of Acquisition   Acquisition
                    Name	         Number            License	&   Source        Date
                    &	Version                       Backup	Copy
                    Number
 Database
 Management

 Word
 Processing

 Spreadsheets

 CAD

 Desktop
 Publishing

 Utilities

 Communications

 Programming
 Language

 Other
EMPLOYEE MEMORANDUM
To: <specify distribution>

From: <senior management official’s name here>

Subject: Software and the U.S. Copyright Act

Date: <insert date here>

The purpose of this memorandum is to remind you of company policy regarding software
duplication. Any duplication of licensed software, except for backup or archival purposes, is
a violation of the U.S. Copyright Act. Each software program, such as AutoCAD® software,
that this company licenses is to be used on only one computer workstation or PC at a time.
If the machine has a program loaded on its hard disk, then that particular program, which
typically has a serial number, should not be loaded on any other hard disk. For example, if
a department has 10 machines with AutoCAD software installed on each, the department
should also have 10 sets of original documentation and system disks or a network license
that stipulates that all 10 licenses are legal.
All workstations or PCs purchased by this company are being supplied with newly licensed
copies of <insert name(s) of software program(s) installed>. <Insert employee name> is respon-
sible for ensuring that each program is properly registered with the software manufacturer.
This company will not tolerate any employee making unauthorized copies of software.
Any employee found copying software other than for backup purposes is subject to termi-
nation. Any employee giving software to any third party, including clients or customers, is
also subject to termination. <{optional} If you want to use software licensed by this company at
home, you must consult with <Insert employee name> before removing the system disks from the
premises.> If we do not enforce a strict policy on the use of software, the company will be
exposed to serious legal liability. Furthermore, it violates our ethical guidelines for proper
business behavior.
<Insert employee name> will be visiting the departments over the next week to inventory
hard disks and to ascertain that original documentation and system disks exist for each copy
of software resident on your hard disk. If documentation, system disks, or both are not pres-
ent, they will be ordered and charged to your department. Please organize your documen-
tation and system disks for the auditor’s review. If you have any questions, please contact
<Insert name>.
CHECKLIST
Following is a simple checklist to help track your company’s
progress in instituting these changes.

	 Completed    Procedure                                 Date	First     Date	of	Second
                                                         Performed	or   Communication
                                                         Distributed

              Company Software Policy
		

              Software Code of Ethics


              Software User Profile


              Software Budget Planning


              Software Register (Electronic Tracking):
              • Network License Borrowing
              • Network License Timeout
              • Autodesk Product Manager

              Software Register (Manual Tracking)


              Employee Memorandum
1. 800.NO.COPIES




Autodesk, Inc.
License Compliance Programs
111 McInnis Parkway
San Rafael, CA 94903 USA

Autodesk is a registered trademark or trademark of Autodesk, Inc., in the USA and/or
other countries. All other brand names, product names, or trademarks belong to their
respective holders. © 2006 Autodesk, Inc. All rights reserved. 000000000000116095

Más contenido relacionado

La actualidad más candente

Optimizing Your Database Performance | Embarcadero Technologies
Optimizing Your Database Performance | Embarcadero TechnologiesOptimizing Your Database Performance | Embarcadero Technologies
Optimizing Your Database Performance | Embarcadero TechnologiesMichael Findling
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Khazret Sapenov
 
Open source vs cloased source
Open source vs cloased sourceOpen source vs cloased source
Open source vs cloased sourcethejacksrd
 
Ian Butler - Resume 2015
Ian Butler - Resume 2015Ian Butler - Resume 2015
Ian Butler - Resume 2015Ian Butler
 
Cost Savings
Cost SavingsCost Savings
Cost Savingsirvin1969
 
7steps software-licensing
7steps software-licensing7steps software-licensing
7steps software-licensingsuyashawasthi
 
Nucleus Research: Evaluating The On-demand Contact Center
Nucleus Research: Evaluating The On-demand Contact CenterNucleus Research: Evaluating The On-demand Contact Center
Nucleus Research: Evaluating The On-demand Contact CenterRightNow Technologies
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence PlatformJohn Fotiadis ✔️
 
Chapter 10 cs 2o-p
Chapter 10 cs 2o-pChapter 10 cs 2o-p
Chapter 10 cs 2o-pIIUI
 
Software Licensing and Customer Satisfaction
Software Licensing and Customer SatisfactionSoftware Licensing and Customer Satisfaction
Software Licensing and Customer SatisfactionFlexera
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC PresentationCloudComputing
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPITJames Galera
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaperAccenture
 
Advanced Acoustic Concepts
Advanced Acoustic ConceptsAdvanced Acoustic Concepts
Advanced Acoustic ConceptsSerena Software
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 

La actualidad más candente (19)

DipTech
DipTechDipTech
DipTech
 
Optimizing Your Database Performance | Embarcadero Technologies
Optimizing Your Database Performance | Embarcadero TechnologiesOptimizing Your Database Performance | Embarcadero Technologies
Optimizing Your Database Performance | Embarcadero Technologies
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
 
Open source vs cloased source
Open source vs cloased sourceOpen source vs cloased source
Open source vs cloased source
 
Ian Butler - Resume 2015
Ian Butler - Resume 2015Ian Butler - Resume 2015
Ian Butler - Resume 2015
 
Cost Savings
Cost SavingsCost Savings
Cost Savings
 
7steps software-licensing
7steps software-licensing7steps software-licensing
7steps software-licensing
 
Nucleus Research: Evaluating The On-demand Contact Center
Nucleus Research: Evaluating The On-demand Contact CenterNucleus Research: Evaluating The On-demand Contact Center
Nucleus Research: Evaluating The On-demand Contact Center
 
Cast Application Intelligence Platform
Cast Application Intelligence PlatformCast Application Intelligence Platform
Cast Application Intelligence Platform
 
Chapter 10 cs 2o-p
Chapter 10 cs 2o-pChapter 10 cs 2o-p
Chapter 10 cs 2o-p
 
Software Licensing and Customer Satisfaction
Software Licensing and Customer SatisfactionSoftware Licensing and Customer Satisfaction
Software Licensing and Customer Satisfaction
 
EMS Case Study
EMS Case StudyEMS Case Study
EMS Case Study
 
Pawaa OCC Presentation
Pawaa OCC PresentationPawaa OCC Presentation
Pawaa OCC Presentation
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
SAM Services powered by AUPIT
SAM Services powered by AUPITSAM Services powered by AUPIT
SAM Services powered by AUPIT
 
IKON PQM Brochure
IKON PQM BrochureIKON PQM Brochure
IKON PQM Brochure
 
Shunra app cloud_whitepaper
Shunra app cloud_whitepaperShunra app cloud_whitepaper
Shunra app cloud_whitepaper
 
Advanced Acoustic Concepts
Advanced Acoustic ConceptsAdvanced Acoustic Concepts
Advanced Acoustic Concepts
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 

Destacado

Information Legal Services
Information Legal ServicesInformation Legal Services
Information Legal Serviceslegal4
 
Presentation Of My Next Career
Presentation Of My Next CareerPresentation Of My Next Career
Presentation Of My Next Careerkurtgui
 
Kikih2
Kikih2Kikih2
Kikih2kalou
 
LOS FAMOSOS - CECY.
LOS FAMOSOS - CECY.LOS FAMOSOS - CECY.
LOS FAMOSOS - CECY.cecymariposa
 
Template For Website
Template For WebsiteTemplate For Website
Template For Websitelegal4
 
Wiki course 'IT Industry Introduction' 2011
Wiki course 'IT Industry Introduction' 2011Wiki course 'IT Industry Introduction' 2011
Wiki course 'IT Industry Introduction' 2011Sergey Dmitriev
 
Executed Plaintiff Declaration
Executed Plaintiff DeclarationExecuted Plaintiff Declaration
Executed Plaintiff DeclarationPeak Organization
 
Presen4 1
Presen4 1Presen4 1
Presen4 1c001ick
 
Crowdfunding SSE Alumni Seminar Teigland & ingram
Crowdfunding SSE Alumni Seminar Teigland & ingramCrowdfunding SSE Alumni Seminar Teigland & ingram
Crowdfunding SSE Alumni Seminar Teigland & ingramRobin Teigland
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...eby
 
Votado Como El Mejor Mail Del AñO
Votado Como El Mejor Mail Del AñOVotado Como El Mejor Mail Del AñO
Votado Como El Mejor Mail Del AñOESPEJO 25
 
PD 2015 Story of Service
PD 2015 Story of ServicePD 2015 Story of Service
PD 2015 Story of ServiceTBuegler
 
Pd2 dog eating chicken 3.17.13
Pd2 dog eating chicken 3.17.13Pd2 dog eating chicken 3.17.13
Pd2 dog eating chicken 3.17.13TBuegler
 

Destacado (20)

Information Legal Services
Information Legal ServicesInformation Legal Services
Information Legal Services
 
Presentation Of My Next Career
Presentation Of My Next CareerPresentation Of My Next Career
Presentation Of My Next Career
 
Navidad2008
Navidad2008Navidad2008
Navidad2008
 
Kikih2
Kikih2Kikih2
Kikih2
 
Teigland Taxi 020
Teigland Taxi 020Teigland Taxi 020
Teigland Taxi 020
 
LOS FAMOSOS - CECY.
LOS FAMOSOS - CECY.LOS FAMOSOS - CECY.
LOS FAMOSOS - CECY.
 
Template For Website
Template For WebsiteTemplate For Website
Template For Website
 
Wiki course 'IT Industry Introduction' 2011
Wiki course 'IT Industry Introduction' 2011Wiki course 'IT Industry Introduction' 2011
Wiki course 'IT Industry Introduction' 2011
 
Executed Plaintiff Declaration
Executed Plaintiff DeclarationExecuted Plaintiff Declaration
Executed Plaintiff Declaration
 
My Manual
My ManualMy Manual
My Manual
 
Presen4 1
Presen4 1Presen4 1
Presen4 1
 
Crowdfunding SSE Alumni Seminar Teigland & ingram
Crowdfunding SSE Alumni Seminar Teigland & ingramCrowdfunding SSE Alumni Seminar Teigland & ingram
Crowdfunding SSE Alumni Seminar Teigland & ingram
 
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...The Intellectual Property Disclosure Process: Releasing Open Source Software ...
The Intellectual Property Disclosure Process: Releasing Open Source Software ...
 
Everyone Coredumps
Everyone CoredumpsEveryone Coredumps
Everyone Coredumps
 
Votado Como El Mejor Mail Del AñO
Votado Como El Mejor Mail Del AñOVotado Como El Mejor Mail Del AñO
Votado Como El Mejor Mail Del AñO
 
Maria Bäcke Defense
Maria Bäcke DefenseMaria Bäcke Defense
Maria Bäcke Defense
 
Class
ClassClass
Class
 
PD 2015 Story of Service
PD 2015 Story of ServicePD 2015 Story of Service
PD 2015 Story of Service
 
Pd2 dog eating chicken 3.17.13
Pd2 dog eating chicken 3.17.13Pd2 dog eating chicken 3.17.13
Pd2 dog eating chicken 3.17.13
 
We and plants 3,4
We and plants 3,4We and plants 3,4
We and plants 3,4
 

Similar a Legal Will Software

infox technologies
infox technologiesinfox technologies
infox technologiesfidharash
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVYamunaP6
 
Benefits of developing custom software, and how it varies from pre-made softw...
Benefits of developing custom software, and how it varies from pre-made softw...Benefits of developing custom software, and how it varies from pre-made softw...
Benefits of developing custom software, and how it varies from pre-made softw...Flexsin
 
10 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development110 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development1Iron Mountain
 
What is Custom Software Development Importance of Custom Software Developmen...
What is Custom Software Development  Importance of Custom Software Developmen...What is Custom Software Development  Importance of Custom Software Developmen...
What is Custom Software Development Importance of Custom Software Developmen...Aditi Parnami
 
Today Custom Software is no longer work in modern days..
Today Custom Software is no longer work in modern days..Today Custom Software is no longer work in modern days..
Today Custom Software is no longer work in modern days..Sukumar Jena
 
The Death of Custom Software
The Death of Custom SoftwareThe Death of Custom Software
The Death of Custom SoftwareRelevantz
 
New Microsoft Word Document.docx
New Microsoft Word Document.docxNew Microsoft Word Document.docx
New Microsoft Word Document.docxAbelAdisu
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered ArchitectureMuhammed Afsal Villan
 
What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?Flexera
 
10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing softwareMRPeasy
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategiessharing notes123
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesSharing Slides Training
 
Reducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer SoftwareReducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer SoftwareEmbarcadero Technologies
 
Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...Embarcadero Technologies
 
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...Orangescrum
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationAbhishek Pasricha
 
How Custom Software Development Can Benefit your Business.pdf
How Custom Software Development Can Benefit your Business.pdfHow Custom Software Development Can Benefit your Business.pdf
How Custom Software Development Can Benefit your Business.pdfIntegrated IT Solutions
 
8 reasons why Custom Software Development is crucial
8 reasons why Custom Software Development is crucial8 reasons why Custom Software Development is crucial
8 reasons why Custom Software Development is crucialMind IT Systems
 

Similar a Legal Will Software (20)

infox technologies
infox technologiesinfox technologies
infox technologies
 
BSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IVBSC Software & Software engineering-UNIT-IV
BSC Software & Software engineering-UNIT-IV
 
Create your own enterprise apps store
Create your own enterprise apps storeCreate your own enterprise apps store
Create your own enterprise apps store
 
Benefits of developing custom software, and how it varies from pre-made softw...
Benefits of developing custom software, and how it varies from pre-made softw...Benefits of developing custom software, and how it varies from pre-made softw...
Benefits of developing custom software, and how it varies from pre-made softw...
 
10 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development110 huge-reasons-why-businesses-need-custom-software-development1
10 huge-reasons-why-businesses-need-custom-software-development1
 
What is Custom Software Development Importance of Custom Software Developmen...
What is Custom Software Development  Importance of Custom Software Developmen...What is Custom Software Development  Importance of Custom Software Developmen...
What is Custom Software Development Importance of Custom Software Developmen...
 
Today Custom Software is no longer work in modern days..
Today Custom Software is no longer work in modern days..Today Custom Software is no longer work in modern days..
Today Custom Software is no longer work in modern days..
 
The Death of Custom Software
The Death of Custom SoftwareThe Death of Custom Software
The Death of Custom Software
 
New Microsoft Word Document.docx
New Microsoft Word Document.docxNew Microsoft Word Document.docx
New Microsoft Word Document.docx
 
Software engineering : Layered Architecture
Software engineering : Layered ArchitectureSoftware engineering : Layered Architecture
Software engineering : Layered Architecture
 
What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?
 
10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software10 things you need to know before buying manufacturing software
10 things you need to know before buying manufacturing software
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Ais Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development StrategiesAis Romney 2006 Slides 19 Ais Development Strategies
Ais Romney 2006 Slides 19 Ais Development Strategies
 
Reducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer SoftwareReducing Total Cost of Ownership for Database and Developer Software
Reducing Total Cost of Ownership for Database and Developer Software
 
Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...Reducing Total Cost of Ownership for Database and Developer Software | Govern...
Reducing Total Cost of Ownership for Database and Developer Software | Govern...
 
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...
Differences between On-Premise Vs Hosted Vs SaaS Project Management Software ...
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software Application
 
How Custom Software Development Can Benefit your Business.pdf
How Custom Software Development Can Benefit your Business.pdfHow Custom Software Development Can Benefit your Business.pdf
How Custom Software Development Can Benefit your Business.pdf
 
8 reasons why Custom Software Development is crucial
8 reasons why Custom Software Development is crucial8 reasons why Custom Software Development is crucial
8 reasons why Custom Software Development is crucial
 

Más de legal4

Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigation
Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website NavigationWebsite Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigation
Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigationlegal4
 
Online Legal Information
Online Legal InformationOnline Legal Information
Online Legal Informationlegal4
 
Public Website Faq 1
Public Website Faq 1Public Website Faq 1
Public Website Faq 1legal4
 
Public Website Faq
Public Website FaqPublic Website Faq
Public Website Faqlegal4
 
Website Newsletter Template
Website Newsletter TemplateWebsite Newsletter Template
Website Newsletter Templatelegal4
 
Starting Website Business
Starting Website BusinessStarting Website Business
Starting Website Businesslegal4
 
Locating Legal Information On The Internet
Locating Legal Information On The InternetLocating Legal Information On The Internet
Locating Legal Information On The Internetlegal4
 
Locating Legal Information On The Web
Locating Legal  Information On The WebLocating Legal  Information On The Web
Locating Legal Information On The Weblegal4
 
Website Disclaimer
Website DisclaimerWebsite Disclaimer
Website Disclaimerlegal4
 
Website Template 1
Website Template 1Website Template 1
Website Template 1legal4
 
Website Template
Website TemplateWebsite Template
Website Templatelegal4
 
Website Maintenance Company
Website Maintenance CompanyWebsite Maintenance Company
Website Maintenance Companylegal4
 
Will Legal Software
Will Legal SoftwareWill Legal Software
Will Legal Softwarelegal4
 
Legal Documentation
Legal DocumentationLegal Documentation
Legal Documentationlegal4
 
Legal Finance
Legal FinanceLegal Finance
Legal Financelegal4
 
Legal Will Forms
Legal Will FormsLegal Will Forms
Legal Will Formslegal4
 
Legal Wills
Legal WillsLegal Wills
Legal Willslegal4
 
Legal Issues Facing Teachers
Legal Issues Facing TeachersLegal Issues Facing Teachers
Legal Issues Facing Teacherslegal4
 
Legal Framework For E Research
Legal Framework For E ResearchLegal Framework For E Research
Legal Framework For E Researchlegal4
 
Legal Faq
Legal FaqLegal Faq
Legal Faqlegal4
 

Más de legal4 (20)

Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigation
Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website NavigationWebsite Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigation
Website Tutorial A Beginner%Ef%Bf%Bds Guide To Website Navigation
 
Online Legal Information
Online Legal InformationOnline Legal Information
Online Legal Information
 
Public Website Faq 1
Public Website Faq 1Public Website Faq 1
Public Website Faq 1
 
Public Website Faq
Public Website FaqPublic Website Faq
Public Website Faq
 
Website Newsletter Template
Website Newsletter TemplateWebsite Newsletter Template
Website Newsletter Template
 
Starting Website Business
Starting Website BusinessStarting Website Business
Starting Website Business
 
Locating Legal Information On The Internet
Locating Legal Information On The InternetLocating Legal Information On The Internet
Locating Legal Information On The Internet
 
Locating Legal Information On The Web
Locating Legal  Information On The WebLocating Legal  Information On The Web
Locating Legal Information On The Web
 
Website Disclaimer
Website DisclaimerWebsite Disclaimer
Website Disclaimer
 
Website Template 1
Website Template 1Website Template 1
Website Template 1
 
Website Template
Website TemplateWebsite Template
Website Template
 
Website Maintenance Company
Website Maintenance CompanyWebsite Maintenance Company
Website Maintenance Company
 
Will Legal Software
Will Legal SoftwareWill Legal Software
Will Legal Software
 
Legal Documentation
Legal DocumentationLegal Documentation
Legal Documentation
 
Legal Finance
Legal FinanceLegal Finance
Legal Finance
 
Legal Will Forms
Legal Will FormsLegal Will Forms
Legal Will Forms
 
Legal Wills
Legal WillsLegal Wills
Legal Wills
 
Legal Issues Facing Teachers
Legal Issues Facing TeachersLegal Issues Facing Teachers
Legal Issues Facing Teachers
 
Legal Framework For E Research
Legal Framework For E ResearchLegal Framework For E Research
Legal Framework For E Research
 
Legal Faq
Legal FaqLegal Faq
Legal Faq
 

Último

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Legal Will Software

  • 1. AUTODESK® LICENSE COMPLIANCE Software Asset Management Toolkit IS YOUR SOFTWARE LEGAL? Make sure your original ideas get original software.
  • 2. TO USE AND CUSTOMIZE THESE TEMPLATES FOR YOUR ORGANIZATION, DOWNLOAD THE SOFTWARE ASSET MANAGEMENT TOOLKIT FROM WWW.AUTODESK.COM/PIRACY.
  • 3. HOW TO USE THE SOFTWARE ASSET MANAGEMENT TOOLKIT Software piracy is a widespread problem • Establish a budget. that affects everyone. Many companies • Put in place a process to account for your who use unauthorized software simply software inventory. have poor software management policies and fail to budget for additional software • Take appropriate steps if you discover resources. To support your efforts to unauthorized copying. remain compliant, Autodesk offers informa- • Be consistent with your organization’s tion, purchase options such as subscription, policy and with the law to ensure that any and software management tools to help problems are corrected and not repeated. you audit your PCs and maintain control over software licenses. Good planning and budgeting, and a well- The easiest way to keep Autodesk design ® documented policy that is regularly com- tools up-to-date is through Autodesk municated companywide, are the keys to Subscription. For an annual fee, the managing software and avoiding situations program provides the latest versions of where employees may be tempted to copy licensed Autodesk software and other ben- software illegally. Use the following tem- efits, offering a budget-conscious way to plates, which are included in this toolkit, to stay current with the latest technology. get started: For more information about Subscription, • Company Software Policy visit www.autodesk.com/subscription. • Software Code of Ethics This toolkit provides guidelines and tem- • Software User Profile plates to help you ensure the legal and ethical use of software in your organization • Software Budget Planning by removing the causes of illegal software • Software Register (Electronic and Manual) copying. Your company can achieve suc- cessful software management by using only • Employee Memorandum licensed products and enforcing compli- • Checklist ance companywide. Because organizations have different needs, First, follow these guidelines and then use you can customize these documents as the templates to execute your plan. necessary. The following sections review • Establish a program of regular software the use of each template in detail. audits to ensure that your company is always in compliance with the law. • Profile each computer and user in your company.
  • 4. Company Software the most effective use of their personal computers. Record your findings on the en- and software capabilities change, software also needs to change. Keep your organiza- Policy closed Software User Profile form. Typical tion’s software profiles current by review- Prominently post a notice that states your software profiles include operating system ing them on a regular basis or by putting organization’s policy about software use software and programs for word process- them on subscription. For a fixed annual and the consequences of violating that ing, spreadsheets, communications, and fee, subscription is a budget-conscious way policy wherever employees congregate, database management. Your users may also to stay current with the latest technology. such as a kitchen or hallway. You can use need computer-aided design and desktop Make a plan that includes surveying your the Company Software Policy template publishing packages, as well as utilities and employees at least once a year. This may included in this toolkit for this purpose. programming languages. highlight the need to acquire new programs or new releases of existing software. It may Designate a person to be responsible for The Software User Profile is designed as also permit specific departments in your ensuring proper software use throughout a discovery tool, that is, a way to determine organization—to the extent permitted by the organization. Typically, this person is what software your employees need, not license agreements—to distribute software the manager of IS (information systems), what they currently have. To list the soft- they no longer use to other departments. EDP (electronic data processing), or CAD ware on each employee’s hard drive, use (computer-aided design). An attorney, the Software Register. financial officer, or accounting professional 2. Deliver needed software to users in a Software Budget inside or outside your organization can also timely manner. If original software is avail- Planning play this role. able in principle, but acquisition is bureau- With every new year comes budgeting cratic, slow, or unduly restrictive, your users responsibilities. It is essential to establish Software Code are being deprived of the software they need to be productive. Frustration may realistic budgets for both hardware and of Ethics cause these users to resort to unauthorized software. Many organizations believe they can take financial shortcuts to pay for Communicate your organization’s com- copying. Ensure that your organization can software—a practice virtually unheard of for mitment to using only licensed software. put software into employees’ hands when hardware acquisitions. Have people in your organization sign the they need it. enclosed Software Code of Ethics, or a simi- Software acquisition sometimes seems to 3. As an organization, commit to supplying lar statement, and post copies of the Code be neglected in budget spreadsheets. Most original software to meet the needs of all throughout your organization. companies can afford to buy the software your users. Ensure that your organization they need, but some believe they can avoid acquires a full range of original software, the expense simply by copying licenses Software User that is, programs in a form fully authorized onto additional computers. This practice is by license or purchase terms, in quantities Profile proportionate to the number of computers in fact illegal and violates software copy- right laws. In an era where unethical cor- 1. Assess your organization’s software in use. These quantities should meet the porate behavior is gaining a lot of negative needs and identify the appropriate soft- requirements of each user’s profile. press, companies using unlicensed software ware profile of each computer or user. 4. Anticipate reasonable user needs and are risking their reputation by acting in an Survey PC users in your organization to de- plan to meet them. As organizations, users, unethical and illegal fashion. termine what software they need to make
  • 5. Smart companies protect themselves by using information such as location and companies, courts have often granted budgeting for software needed for exist- authorized user, and it lists the software search warrants that permit surprise in- ing employees as well as for upturns in authorized for use on that computer. A spections of organizations suspected of their business that may require additional software register can be a focal point not using unauthorized software. software resources during the year. The only for planning software use but also for 2. Be ready for any surprise inspection best managers are prepared for unforeseen monitoring to ensure that only licensed by conducting your own first. According to expenditures. software is used. In addition to the soft- Autodesk’s end-user license agreement, ware register, you should also maintain eas- “To ensure compliance with this Agree- Software Register ily accessible files with the actual software license agreements, invoices, and other ment, you agree that upon reasonable notice, Autodesk or Autodesk’s authorized Once you have completed the Software documents showing that the software has representative shall have the right to Budget Planning and Software User Profile been acquired legally. Returning registra- inspect and audit your installation, access forms, follow these steps using the Soft- tion cards to software companies facilitates and use of the software.” Various computer ware Register. this process and provides other benefits as programs, ranging from batch files that run 1. Electronically track Autodesk software well. For example, the benefits of regis- in disk operating systems to full-featured through the Autodesk Network License tering Autodesk products include timely, utilities, can be used to identify the pro- Manager and Autodesk Product Manager. low-cost upgrades, access to new product grams on a computer hard drive. Special To efficiently track Autodesk software, information, and notification of important audit software is also available. Many Autodesk has incorporated features such as product changes. You can also use the auditing firms have made software audits the Network License Manager and the Au- software register to track stand-alone and part of their routine financial audit. Consult todesk Product Manager. Network licens- subscription-based licenses. With subscrip- your auditing firm for more information. ing provides features to ensure that users tion-based licenses, it is easier to remain have access to the software they need. compliant, budget for software on an an- Products based on AutoCAD software offer ® nual basis, and ensure that everyone has a Network License Manager feature that the latest software. includes network license borrowing with check-in and check-out capabilities. The Employee Network License Manager also provides a Network License Timeout feature that frees Memorandum idle licenses for cost-effective usage across Follow up with a memo to your employees the organization. In addition, AutoCAD- by using the Employee Memorandum tem- based products offer the Autodesk Product plate to reinforce your company policy. Manager, a software inventory tool to 1. Inspect the software that is actually improve asset tracking. in use to ensure that all programs are legiti- 2. Manually track all software acquisitions mately acquired originals, duly accounted in a software register. Use the enclosed for in the Software Register. Inspections Software Register form for this purpose. A are most effective when conducted without software register identifies each computer prior notice. In legal actions by software
  • 7. COMPANY SOFTWARE POLICY 1. <Insert company or organization name> licenses the use of computer software from a variety of outside companies. <Insert company or organization name> does not own this software or its related documentation and, unless authorized by the software developer, does not have the right to reproduce it. 2. With regard to use on local area networks or multiple machines, <Insert company or organi- zation name> employees shall use the software only in accordance with the license agree- ment. 3. <Insert company or organization name> employees learning of any misuse of software or related documentation within the Company shall notify the department manager or <insert company or organization name> legal counsel. 4. According to the U.S. Copyright Law, persons involved in the illegal reproduction of soft- ware face civil damages of as much as US$150,000, and criminal penalties, including fines and imprisonment. <Insert company or organization name> does not permit the illegal duplica- tion of software. <Insert company or organization name> employees who make, acquire, or use unauthorized copies of computer software shall be disciplined accordingly and may be subject to termination. I, , am fully aware of the software-use policies of <Insert company or organization name> and agree to uphold them. Signed Dated
  • 8. SOFTWARE CODE OF ETHICS (Developed by the Business Software Alliance) Unauthorized duplication of copyrighted computer software violates the law and is contrary to our organization’s ethical standards. We disapprove of such copying and will apply the following principles to prevent its occurrence. • We will neither commit nor tolerate under any circumstances the creation or use of un- authorized software copies. • We will provide, in a timely fashion, legitimately acquired software to meet all software needs and in sufficient quantities for all our computers. • We will comply with all license terms regulating the use of any software we acquire or use. • We will enforce strong internal controls to prevent the creation or use of unauthorized software copies, including effective measures to verify compliance with these standards and appropriate disciplinary actions for violation of these standards. <signature of organization President> <insert name and title of organization President> <insert organization name>
  • 9. SOFTWARE USER PROFILE User name Date Job title User requires software for the functions outlined in the following table: Used For Application Name Brief Rationale for Installation of Each Program Database Management Word Processing Spreadsheets CAD Desktop Publishing Utilities Communications Programming Language Other
  • 10. SOFTWARE BUDGET PLANNING Proper budget planning is key to sound software management. It enables all employees to have the tools they need to be productive. It allows for unforeseen increases in resources throughout the year. It establishes a known budget for software for the year. And it eliminates piracy risks. Following is a sample spreadsheet to calculate your annual software budget. Annual Budget Request Vendor Product/Service Cost Notes Total $$$
  • 11. SOFTWARE REGISTER: ELECTRONIC TRACKING AutoCAD-based products offer flexible Refer to your Autodesk software user network license management capabilities manual for details on installing the Network such as the Network License Borrowing and License Manager and using the License Bor- Network License Timeout features. rowing and License Timeout features. Network License Autodesk Product Borrowing Manager If your Autodesk product supports the A common problem in an office is not License Borrowing feature, you can use the knowing exactly what software is installed 1. To conduct a search, from the File menu, Options file to configure license borrowing throughout the network. To resolve this choose New Search. A dialog box provides options. For example, you can define the problem, Autodesk has incorporated a list of products to locate and computers maximum number of licenses that cannot a software inventory tool called Autodesk to search. be borrowed from your network at any one Product Manager into all AutoCAD-based time. In addition, you can define which us- software. 2. Name your search in the space provided. ers can borrow an Autodesk product license. The Autodesk Product Manager is included 3. Under Products to Search, select the (If your Autodesk product supports license as part of the Autodesk CAD Manager Tools Autodesk software you want to search borrowing, and licenses are borrowed from for improved asset tracking. It compiles for. a redundant license server pool, you must a report that lists the Autodesk software restart the license server after you stop the 4. Under Computers to Search, you will see installed on the computers in the network. Network License Manager.) At the end of a a list of available network computers. Use the Autodesk Product Manager to in- borrowing period, the borrowed license is Highlight your choice, and click the right ventory your licenses and keep track of who automatically disabled on the user’s com- arrow to move it to the Computers Added is using them. The tool reports the applica- puter and becomes available again on the to Search pane. tion version, serial number, service pack license server. Users can return a license level, machine name, and more. By perform- Later you can open an existing search, before a borrowing period has ended. ing an inventory of installed Autodesk soft- modify a search, print a report, or export ware on a PC, LAN, or WAN from a single a report—all from the File menu. From the Network License location, the Autodesk Product Manager en- Search menu, you can run, pause, or clear a Timeout ables the CAD or IT manager to easily keep track of installed software assets, ensure search. The License Timeout feature enables you to maximum return on technology investment, determine how long a product session can and avoid excess software purchases. be idle before the license server reclaims the license. When you set this flag, the license server reclaims a license if the prod- uct is idle on a workstation for more than a specified time. If a user’s license is lost because of the idle timeout, the product at- tempts to claim a new license once the user accesses the product again. If no license is available, the user can save work before the product shuts down.
  • 12. SOFTWARE REGISTER: MANUAL TRACKING Name of authorized user: Job title: Used For Application Serial Price Location of Acquisition Acquisition Name Number License & Source Date & Version Backup Copy Number Database Management Word Processing Spreadsheets CAD Desktop Publishing Utilities Communications Programming Language Other
  • 13. EMPLOYEE MEMORANDUM To: <specify distribution> From: <senior management official’s name here> Subject: Software and the U.S. Copyright Act Date: <insert date here> The purpose of this memorandum is to remind you of company policy regarding software duplication. Any duplication of licensed software, except for backup or archival purposes, is a violation of the U.S. Copyright Act. Each software program, such as AutoCAD® software, that this company licenses is to be used on only one computer workstation or PC at a time. If the machine has a program loaded on its hard disk, then that particular program, which typically has a serial number, should not be loaded on any other hard disk. For example, if a department has 10 machines with AutoCAD software installed on each, the department should also have 10 sets of original documentation and system disks or a network license that stipulates that all 10 licenses are legal. All workstations or PCs purchased by this company are being supplied with newly licensed copies of <insert name(s) of software program(s) installed>. <Insert employee name> is respon- sible for ensuring that each program is properly registered with the software manufacturer. This company will not tolerate any employee making unauthorized copies of software. Any employee found copying software other than for backup purposes is subject to termi- nation. Any employee giving software to any third party, including clients or customers, is also subject to termination. <{optional} If you want to use software licensed by this company at home, you must consult with <Insert employee name> before removing the system disks from the premises.> If we do not enforce a strict policy on the use of software, the company will be exposed to serious legal liability. Furthermore, it violates our ethical guidelines for proper business behavior. <Insert employee name> will be visiting the departments over the next week to inventory hard disks and to ascertain that original documentation and system disks exist for each copy of software resident on your hard disk. If documentation, system disks, or both are not pres- ent, they will be ordered and charged to your department. Please organize your documen- tation and system disks for the auditor’s review. If you have any questions, please contact <Insert name>.
  • 14. CHECKLIST Following is a simple checklist to help track your company’s progress in instituting these changes. Completed Procedure Date First Date of Second Performed or Communication Distributed Company Software Policy Software Code of Ethics Software User Profile Software Budget Planning Software Register (Electronic Tracking): • Network License Borrowing • Network License Timeout • Autodesk Product Manager Software Register (Manual Tracking) Employee Memorandum
  • 15.
  • 16. 1. 800.NO.COPIES Autodesk, Inc. License Compliance Programs 111 McInnis Parkway San Rafael, CA 94903 USA Autodesk is a registered trademark or trademark of Autodesk, Inc., in the USA and/or other countries. All other brand names, product names, or trademarks belong to their respective holders. © 2006 Autodesk, Inc. All rights reserved. 000000000000116095