eBook

Using Compliance Analytics

Best Practices of Highly Effective License Compliance Managers

Accelerate Settlements and Conversions with Compliance Analytics

At Revenera, we’ve helped hundreds of software companies monetize piracy and infringement. Along the way, we’ve identified comprehensive best practices for accomplishing this quickly and effectively. This ebook summarizes key lessons we’ve learned about capturing better data, making informed decisions about it, and efficiently managing the process of transforming leads into revenue.

Capture the Right Data and Capture Enough of It

Capture the Richest Mix of Data Possible

Rarely is an IP address sufficient to confidently identify and understand infringers. You need far more data. This can include unique hardware identifiers (e.g., MAC addresses), detailed module usage data, specific known-pirated version data, domain names, egress IP addresses, and more. All this can be captured transparently, without impacting application performance.

Leverage Geolocation Data and Mapping APIs

Capture geolocation on Wi-Fi connected laptops and other client devices. Linked to Google Maps APIs, this data can even deliver aerial views of physical locations. Even when such views aren’t available, geolocation data can add certainty to other location data.

Supplement Compliance Analytics Data with Other Data Sources

Better assess potential leads by enriching them with information from your customer and prospect databases, third-party business databases, and proprietary industry knowledge about other infringements.

Simplify and Automate the Assembly of Data About Any Prospect

The right tools automatically assemble all data associated with each prospect, without requiring developers to write scripts, SQL queries, or web service calls. That way, you can get the job done yourself, without competing for scarce technical resources.

Consider Capturing Personally Identifiable Data Where This Can Be Done in Strict Compliance with the Law

Using location data, advanced software intelligence tools can determine on-the-fly whether data needs to be anonymized, and where it should be sent and stored. That means you can use personalized data in the US without risking violation of EU privacy rules.

Make Sure your Legal Agreements Support Appropriate Data Capture

To capture client data for compliance auditing and user behavior analysis consistent with privacy law, you must claim your right to do so in contracts and EULAs.

Analyze Your Data and Set Priorities

Map Leads to Accounts

Implement systems that automatically aggregate all infringements associated with a specific organization, identify that organization, and link with existing accounts or prospects where they exist in your CRM.

Focus on Significant Usage Over Time, Not Just “Tire Kicking”

Don’t focus resources on a single brief infringement: look for multiple sessions and use of multiple modules that represent meaningful theft of your intellectual property to gain business value. As a practical matter, doing this requires sophisticated automated correlation and analysis tools.

Leverage Out-of-the-Box Compliance Dashboards

Access basic metrics immediately including: total compliance opportunity, damage calculations, count of infringing organizations, number of machines running pirated software, and number of infringements that represent actual use of your application. You should also be able to easily customize your dashboards to generate geographic heat maps, segment and filter based on your business models, and integrate other business intelligence tools to support and analyze higher volumes of infringement data.

Automatically Prioritize Follow Up with Lead Scoring

When generating large numbers of leads, use tools that score them automatically based on rules you define and adjust (e.g., levels of usage over time, number of machines, etc.). Your most qualified opportunities automatically rise to the top.

Be Clear Upfront About Your Goals for Each Client or Prospect

Don’t let emotions such as anger or betrayal interfere with your strategy for an infringer. Focus on understanding the business needs that led to piracy, meeting them with your paid-for technology, and moving forward. If your goal is revenue for previous usage—and paid-up licenses and maintenance contracts—make sure your entire team knows that. You don’t want a salesperson to settle for a vague promise of future business or a minor favor on a current project.

Streamline Case Management

Integrate Your Compliance and CRM Systems

Integrate your compliance and CRM systems, so it’s easy to receive and share relevant information, communicate with team members and partners, and automate your case management workflows.

Provide the Right Information to the Right People, When They Need It

Implement systems that make it easy to provide summary data at any level, or granular detail about only specific clients. For example, you might selectively provide limited compliance dashboards to those who need them, or use tools that make it easier to generate and share PDF reports.

Streamline Workflow and Approval Processes

Manage your compliance pipeline with a portal that lets you assign leads internally and externally approve cases, review program status, and analyze results by market, geography, partners, and more.

Use Templates to Get Instructions and Letters Right

Standardize and simplify the generation of instructions to salespeople and other compliance team members, as well as letters and language you will use with your infringing prospect or customer.

Use Outside Compliance Specialists

If you don’t have the resources to manage compliance in certain markets, or if internal sales organizations can’t comfortably do so, leverage outside compliance specialists with expertise in monetizing piracy efficiently and dispassionately, based on best practices and extensive experience.

Automate Reports and Workflows That Help You Track Your Progress

By linking your compliance tools to your CRM and other tools, you can simplify the management leads to revenue and track the relative performance associated with multiple products, channels, and partners. You can potentially view conversion rates, revenue rollups, and more, without leaving your compliance dashboard.

Generate Revenue from Unlicensed Use

Don’t Share All Your Information Upfront

On first contact, give your infringer just enough information for him to verify that piracy does in fact exist: for example, MAC addresses implicating specific devices, or knownpirated licenses in use. Until your infringer responds, hold back what you know about the piracy’s full extent in space and time. This is information you can often use effectively in negotiations, or if your executive contact lies or shades the truth in future conversations.

When Possible, Build Alliances with the Infringer’s Senior Management

A surprisingly large number of infringers will pay if you can prove infringement. You can often position yourself on the side of the enterprise or its IT management, helping them self-audit to uncover security risks associated with cracked software throughout their own organizations.

Keep Tracking Piracy After Your First Contact

If piracy disappeared immediately after your first executive contact, the executive may be conspiring with lower-level pirates to hide their tracks. If piracy is continuing, the executive may be conducting a legitimate investigation. Knowing this can help you strategize your next steps.

Use In-App Messaging to Monetize B2C Piracy

Using sophisticated software intelligence tools, you can build automated sequences of in-app messages and behaviors that begin by gently informing users that their software is unlicensed, and gradually move toward limiting functionality or reverting to trial versions. This strategy has been repeatedly shown to generate significant new revenue streams with modest investments in time and resources.

Frequently Asked Questions (FAQs)

License compliance management involves monitoring and enforcing software usage to ensure customers adhere to licensing agreements. It helps prevent piracy and unauthorized use, protecting intellectual property and revenue streams. Effective compliance management uses analytics and automation to streamline processes and improve outcomes.

Detailed data, such as hardware identifiers and geolocation, enables companies to accurately identify infringers and assess the scope of piracy. This information supports informed decision-making and strengthens compliance efforts. Comprehensive data capture also helps organizations comply with privacy laws and contractual obligations.

Compliance analytics provide actionable insights into infringement patterns, usage levels, and potential revenue opportunities. By automating lead scoring and prioritizing follow-up, companies can quickly convert leads into settlements. Analytics also help focus resources on the most significant cases, improving efficiency.

Companies must capture and process personally identifiable data in strict compliance with privacy laws. Advanced tools can anonymize data as needed and ensure proper storage and transmission. Legal agreements, such as contracts and EULAs, should explicitly support appropriate data capture for compliance purposes.

By proving infringement and engaging with senior management, companies can negotiate settlements and convert piracy into revenue. In-app messaging strategies can gently inform users and encourage legitimate purchases. These approaches have been shown to generate significant new revenue streams.

Want to learn more?

See how you can generate new license revenue from software piracy and overuse.