Main Nav

Hi All,

 

We have been selected by IBM for a Software License Review (SLR).  This will be our first SLR.  Has anyone experienced an SLR with IBM and willing to share their experience so we know what to expect?  It would be good to know what is covered, what IBM’s approach is and how extensive it is so we can be better prepared.

 

Thanks,

Tom

 

Tom Barosky

Software Licensing Specialist

Northeastern University

360 Huntington Ave.  MS 221-177

Boston, MA  02115

Phone:  617.373.5122

Cell: 617.637.5760

Fax: 617.373.2054

th.barosky@neu.edu

 

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

Comments

Tom, my earlier comments on approach to software audits , if you can find that in the archive this year, may be applicable. But some questions to consider..

What do your contracts say on this issue? Is IBM showing you evidence of good cause, in other words, a specific example of alleged abuse. Or is this a fishing expedition? Is it limited to your central data center and a Product? Or broad? Do they expect you to install some tool? Will they guarantee that NO security problem is then possible and does your security team agree? Would you permit them a few hours onsite and they can look over a shoulder as you show inventory numbers? Will it be ibm employees or a third party that may benefit from finding something. Has IBM showed you what they think you have licensed and does it match? Will they take a letter from you saying you are compliant? What is your account manager doing for you. And etc...

I would engage your counsel to work with you on this. I do think it is important to be very responsive when evidence of possible mis use is presented.

Good luck!

Sent from my iPad
Margaret (Marg) H. Knox
The University of Texas System

Hi All,

 

We have been selected by IBM for a Software License Review (SLR).  This will be our first SLR.  Has anyone experienced an SLR with IBM and willing to share their experience so we know what to expect?  It would be good to know what is covered, what IBM’s approach is and how extensive it is so we can be better prepared.

 

Thanks,

Tom

 

Tom Barosky

Software Licensing Specialist

Northeastern University

360 Huntington Ave.  MS 221-177

Boston, MA  02115

Phone:  617.373.5122

Cell: 617.637.5760

Fax: 617.373.2054

th.barosky@neu.edu

 

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

Tom, my earlier comments on approach to software audits , if you can find that in the archive this year, may be applicable. But some questions to consider..

What do your contracts say on this issue? Is IBM showing you evidence of good cause, in other words, a specific example of alleged abuse. Or is this a fishing expedition? Is it limited to your central data center and a Product? Or broad? Do they expect you to install some tool? Will they guarantee that NO security problem is then possible and does your security team agree? Would you permit them a few hours onsite and they can look over a shoulder as you show inventory numbers? Will it be ibm employees or a third party that may benefit from finding something. Has IBM showed you what they think you have licensed and does it match? Will they take a letter from you saying you are compliant? What is your account manager doing for you. And etc...

I would engage your counsel to work with you on this. I do think it is important to be very responsive when evidence of possible mis use is presented.

Good luck!

Sent from my iPad
Margaret (Marg) H. Knox
The University of Texas System