Guard Your Source Ip Protection For Software

1,432 views

Published on

Presentation on approaches to protecting intellectual property rights in software

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,432
On SlideShare
0
From Embeds
0
Number of Embeds
21
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Guard Your Source Ip Protection For Software

  1. 1. Guard Your Source: IP Protection for Software <ul>Mital M. Patel (@mitalpatel) [email_address] Law Office of Mital M. Patel www.TriangleBusinessLaw.com #GuardYourSource </ul>
  2. 2. Disclaimer These materials should not be considered as, or as a substitute for, legal advice and they are not intended to nor do they create an attorney-client relationship. Because the materials included here are general, they may not apply to your individual legal or factual circumstances. You should not take (or refrain from taking) any action based on the information you obtain from these materials without first obtaining professional legal counsel.
  3. 3. Overview of IP <ul><li>Trademark
  4. 4. Copyright
  5. 5. Patent
  6. 6. Trade Secret </li></ul>
  7. 7. Non Disclosure Agreements (NDAs) <ul><li>Overuse
  8. 8. Often difficult to enforce
  9. 9. Execution > Idea
  10. 10. Useful for: Employees, partners, consultants, potential acquirers, etc...
  11. 11. Insulting to: Angels, venture capitalists, investors, etc... </li></ul>
  12. 12. Copyright for Source Code <ul><li>Copyright designed to protect creativity
  13. 13. Software as a “literary work”
  14. 14. “exclusive right to make and distribute copies, and to create derivative works”
  15. 15. Disadvantages: </li><ul><li>Doesn't protect against reverse engineering (only copying) </li></ul></ul>
  16. 16. Software Patents <ul><li>Broad protection (exclusion from use, creation, sale)
  17. 17. Limited period of time (usually 20 years)
  18. 18. Bilski decision </li><ul><li>Business method patents
  19. 19. “machine or transformation” test </li></ul><li>Cost prohibitive </li></ul>
  20. 20. Licensing software <ul><li>Most common method of software distribution
  21. 21. Conveys right to use software, not copy, distribute, sale/resale.
  22. 22. Sophisticated ways to protect licensor and licensee </li><ul><li>Ex. Source code escrow </li></ul></ul>
  23. 23. Protecting Open Source <ul><li>Read the license </li><ul><li>What rights / obligations if distributing derivative work </li></ul><li>Considerations when using open source code in commercial code: </li><ul><li>For (core) business?
  24. 24. Open Source License </li></ul></ul>
  25. 25. Protecting Software as a Service (SaaS) <ul><li>Trade secret, patent, copyright
  26. 26. But... </li><ul><li>First to market
  27. 27. Market awareness
  28. 28. Customer Development </li></ul></ul>
  29. 29. Q & A <ul><li>For more information, feel free to contact me:
  30. 30. Phone : 919.386.9989
  31. 31. Email : [email_address]
  32. 32. Twitter : @mitalpatel </li></ul>

×