SlideShare a Scribd company logo
1 of 1
Download to read offline
Is the source code your only IP? Can someone easily
replicate your client list and market & sell to your
target industry? How much of a role do sales &
marketing play in your business? Once you define
what exactly is your IP, it’s easier to restrict access.
UPLOAD CODE TO
A SECURE SERVER
Make sure your source code is uploaded to a server
in the US, your own server, or the server of a
partner company in the US, at least once a week —
if not more often. This includes all code that is
currently being written. This way, you always have
the latest code available to you. Monitor what is
actually being uploaded.
MAKE SURE VENDORS
UNDERSTAND IP
Inquire how intellectual property is viewed in the
partner’s company. Do they teach about IP and how
it should be protected in-house?
ENSURE PROPER
LEGAL PROTECTION
Ensure, at a minimum, that both you and your
technology partner sign NDAs directly with each of
your team members. Look at contracts between
the 3rd party company and their employees to
determine who owns the work they are doing for
you. How will rights be assigned back to you?
RESPECT DATA PRIVACY
With 99.9% of our clients, we have no access to user
data or production — nor do we want it. Any DB
data that is used or sent to us for testing is sanitized
of all personal information beforehand, so we get
access only to code, PM tools, and bug tracking.
Further access is strictly need-to-know. When code
security is an issue, we upload code daily to the
client’s server.
FORTUNE 500 COMPANIES HAVE THE
SAME CONCERNS. WE KNOW BECAUSE
SOFTJOURN WORKS WITH THEM
If you would like to talk about this further and how
we work with other companies around IP issues,
contact Softjourn at +1.510.744.1528 .
CONTRAC T
IDENTIFY YOUR IP
Intellectual property
when working with 3rd
party developers
Intellectual property (IP) can become an issue when you work with
third party providers, whether your employees or someone else’s.
These steps can help protect your IP and keep source code safe.

More Related Content

Similar to Intellectual Property When Working With 3rd Party Developers

Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPSachi Sawamura
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Network security
Network securityNetwork security
Network securityROBERT S
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?Jennifer O'Neill
 
Unit8 e-commerce
Unit8 e-commerce Unit8 e-commerce
Unit8 e-commerce adamlawson
 
HEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSHEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSKen Dailey
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerceadamlawson
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerceadamlawson
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsMuruga J
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Data Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpData Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpNarola Infotech
 
Backup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonBackup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonFares Sharif
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfJose thomas
 
Escrowtech Services in Chennai | Software Escrow Agreement Company
Escrowtech Services in Chennai | Software Escrow Agreement CompanyEscrowtech Services in Chennai | Software Escrow Agreement Company
Escrowtech Services in Chennai | Software Escrow Agreement Companyescrowsoftware
 
What is Software Escrow?
What is Software Escrow?What is Software Escrow?
What is Software Escrow?escrowsoftware
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 

Similar to Intellectual Property When Working With 3rd Party Developers (20)

Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Network security
Network securityNetwork security
Network security
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
 
Unit8 e-commerce
Unit8 e-commerce Unit8 e-commerce
Unit8 e-commerce
 
HEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONSHEM INNOVATIVE SOLUTIONS
HEM INNOVATIVE SOLUTIONS
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerce
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerce
 
Embed trust in your software & data
Embed trust in your software & dataEmbed trust in your software & data
Embed trust in your software & data
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Data Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can HelpData Security in Fintech App Development: How PHP Can Help
Data Security in Fintech App Development: How PHP Can Help
 
Backup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-MonBackup of FinalExam-EssayQ-Mon
Backup of FinalExam-EssayQ-Mon
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
 
Escrowtech Services in Chennai | Software Escrow Agreement Company
Escrowtech Services in Chennai | Software Escrow Agreement CompanyEscrowtech Services in Chennai | Software Escrow Agreement Company
Escrowtech Services in Chennai | Software Escrow Agreement Company
 
What is Software Escrow?
What is Software Escrow?What is Software Escrow?
What is Software Escrow?
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 

More from Softjourn, Inc.

3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)
3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)
3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)Softjourn, Inc.
 
Softjourn Corporate Social Responsibility 2019
Softjourn Corporate Social Responsibility 2019Softjourn Corporate Social Responsibility 2019
Softjourn Corporate Social Responsibility 2019Softjourn, Inc.
 
EIB Blockchain Challenge: Commercial Papers Blockchain POC
EIB Blockchain Challenge: Commercial Papers Blockchain POCEIB Blockchain Challenge: Commercial Papers Blockchain POC
EIB Blockchain Challenge: Commercial Papers Blockchain POCSoftjourn, Inc.
 
Securing Prepaid cards with Biometrics
Securing Prepaid cards with BiometricsSecuring Prepaid cards with Biometrics
Securing Prepaid cards with BiometricsSoftjourn, Inc.
 
Hackathon - London Blockchain Week 2018
Hackathon - London Blockchain Week 2018Hackathon - London Blockchain Week 2018
Hackathon - London Blockchain Week 2018Softjourn, Inc.
 
Financial Software Development With Softjourn
Financial Software Development With SoftjournFinancial Software Development With Softjourn
Financial Software Development With SoftjournSoftjourn, Inc.
 
Financial software Development With Softjourn
Financial software Development With SoftjournFinancial software Development With Softjourn
Financial software Development With SoftjournSoftjourn, Inc.
 
Softjourn Communication Infographic
Softjourn Communication Infographic Softjourn Communication Infographic
Softjourn Communication Infographic Softjourn, Inc.
 

More from Softjourn, Inc. (8)

3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)
3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)
3 Ways to Add Social Distancing to Your Venue (Plus Other Considerations)
 
Softjourn Corporate Social Responsibility 2019
Softjourn Corporate Social Responsibility 2019Softjourn Corporate Social Responsibility 2019
Softjourn Corporate Social Responsibility 2019
 
EIB Blockchain Challenge: Commercial Papers Blockchain POC
EIB Blockchain Challenge: Commercial Papers Blockchain POCEIB Blockchain Challenge: Commercial Papers Blockchain POC
EIB Blockchain Challenge: Commercial Papers Blockchain POC
 
Securing Prepaid cards with Biometrics
Securing Prepaid cards with BiometricsSecuring Prepaid cards with Biometrics
Securing Prepaid cards with Biometrics
 
Hackathon - London Blockchain Week 2018
Hackathon - London Blockchain Week 2018Hackathon - London Blockchain Week 2018
Hackathon - London Blockchain Week 2018
 
Financial Software Development With Softjourn
Financial Software Development With SoftjournFinancial Software Development With Softjourn
Financial Software Development With Softjourn
 
Financial software Development With Softjourn
Financial software Development With SoftjournFinancial software Development With Softjourn
Financial software Development With Softjourn
 
Softjourn Communication Infographic
Softjourn Communication Infographic Softjourn Communication Infographic
Softjourn Communication Infographic
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

Intellectual Property When Working With 3rd Party Developers

  • 1. Is the source code your only IP? Can someone easily replicate your client list and market & sell to your target industry? How much of a role do sales & marketing play in your business? Once you define what exactly is your IP, it’s easier to restrict access. UPLOAD CODE TO A SECURE SERVER Make sure your source code is uploaded to a server in the US, your own server, or the server of a partner company in the US, at least once a week — if not more often. This includes all code that is currently being written. This way, you always have the latest code available to you. Monitor what is actually being uploaded. MAKE SURE VENDORS UNDERSTAND IP Inquire how intellectual property is viewed in the partner’s company. Do they teach about IP and how it should be protected in-house? ENSURE PROPER LEGAL PROTECTION Ensure, at a minimum, that both you and your technology partner sign NDAs directly with each of your team members. Look at contracts between the 3rd party company and their employees to determine who owns the work they are doing for you. How will rights be assigned back to you? RESPECT DATA PRIVACY With 99.9% of our clients, we have no access to user data or production — nor do we want it. Any DB data that is used or sent to us for testing is sanitized of all personal information beforehand, so we get access only to code, PM tools, and bug tracking. Further access is strictly need-to-know. When code security is an issue, we upload code daily to the client’s server. FORTUNE 500 COMPANIES HAVE THE SAME CONCERNS. WE KNOW BECAUSE SOFTJOURN WORKS WITH THEM If you would like to talk about this further and how we work with other companies around IP issues, contact Softjourn at +1.510.744.1528 . CONTRAC T IDENTIFY YOUR IP Intellectual property when working with 3rd party developers Intellectual property (IP) can become an issue when you work with third party providers, whether your employees or someone else’s. These steps can help protect your IP and keep source code safe.