We wish you a Merry Audit and a Happy New Year!

Happy New Year to You and your company! But before that, perhaps, Happy Software Audit! For a number of independent software vendors the approaching December 31 marks the fiscal year end, when they seek to grab every last penny of revenue. One of the ways to get there is to audit the customers. So for […]

Managing Shadow IT in Three Steps

Shadow IT has become an unavoidable part of enterprise workflows. Skype, Google Docs, Dropbox, Slack, Evernote, etc. – corporate data flows between unauthorised applications and services uncontrolled and unmanaged. In the previous post we talked about inefficiencies and serious risks shadow IT poses and, yet, discovered a number of real benefits. However, those benefits are […]

Shadow IT: The Good, the Bad, and the Costly

The road to hell is paved with shadow IT The initial aim of using shadow IT resources is pure – lines of business want to get their jobs done in a more efficient way. There are good reasons why shadow IT emerges within an organization, we discussed those in the previous post. However, by installing […]

Click-Through Agreement Risk Management Solution:
Feedback from SAM Professionals

In this post we summarize the discussion in the ITAM review forum and address the issues raised by SAM professionals. In evaluating the effectiveness and usability of Binadox as a solution to manage click-through EULAs and ToS risks, some questions were raised around its applicability, particularly within the confines of a locked down environment. SAM […]

Cloud Application Threats in Terms of ITAM

Unless you work in an environment where access to cloud applications is revoked, cloud security issues are unavoidable. However beneficial emerging cloud services could be, security risks they pose to your company can cancel that out. Ultimately, when improperly managed, use of cloud applications could lead to higher expenditures and reputational damages, which companies need […]

Shadow IT: What is it and what’s behind it?

There is nothing concealed that will not be revealed. Shadow IT is not the case. Shadow IT refers to IT resources (devices, software, services) used by employees without explicit permission of the organization’s IT department. Either the technology is not approved by the department or IT specialists are simply unaware that a business unit is […]

Are clickwrap agreements held enforceable by American courts?

Introduction A clickwrap agreement is an online contract form widely used over the Internet. It is a prevalent way by which website and software users enter into contracts online. The clickwrap agreement presents the terms and conditions, users have to accept in order to install software or subscribe and use a cloud service. By clicking […]

Clickwrap held enforceable.
Appistry, Inc. v. Amazon.com, Inc. (2015)

The Amazon Web Services platform offers cloud computing services for businesses. Appistry registered to use Amazon Web Services. An Appistry employee created an AWS account and during the sign-up process clicked through the AWS Customer Agreement. Later Appistry claimed that Amazon infringed on Appistry’s patents and filed a lawsuit in Missouri. Amazon argued improper venue […]

Clickwrap held enforceable.
Feldman v. Google, Inc. (2007)

Google’s ‘AdWords’ program offers ‘pay per click’ advertising, which allows businesses and individuals to increase website traffic. If an internet user searches using keywords bought by an advertiser, the ad appears at the top of the webpage. Every time the ad is clicked, sending a visitor to the advertiser’s website, the advertiser is charged by […]

Clickwrap held unenforceable.
National Auto Lenders, Inc. v. Syslocate, Inc. (2010)

Syslocate, Inc. provides Global Positioning System (GPS) tracking units. The GPS units allow customers to track location of vehicles via the Syslocate website. National Auto Lenders, Inc. provides indirect lending services for car buyers. NAL purchases installment contracts from retail car dealers and takes liens on the cars that are subject to the loans. In […]