SlideShare a Scribd company logo
1 of 17
Download to read offline
Open Source Software, IP and trade
secrets: an impossible marriage?
Fenna Douwenga
Contents
1) Open Source Software (OSS) licenses
2) Software Patents
3) Trade Secrets on software
Three contradicting ways to deal with the fact that information wants to be
free
Photographs in this presentation were made available by Pexels.com and Pixabay.com under Creative Commons Zero (CC0)
license
Open Source Software and OSS
licenses
The principles
• Source code is made
available;
• Free distribution of the
software;
• Right to amend the source
code;
• Based on copyright.
Relevant facts relating to OSS licenses
• Many types of OSS licenses within the copyleft and permissive license spectrum, but
around 50% are GPL licenses;
• US law is most commonly used;
• ~85% of companies and their developers use OSS;
• Convergence of OSS and proprietary software is more and more common;
• GPLv3 forbids invoking patents by contributors of the OSS against the OSS licensed
under GPLv3 (article 11, 3rd paragraph), also any patent license to one member of the
community, is granted for all recipients of the covered work (article 11, 5th paragraph);
• GPL v3 does not include a specific reference to trade secrets;
• Limitations of OSS licenses only apply after distribution.
Patents
The principles
• Description of invention is
made available;
• Monopoly for limited period
of time;
• Distribution of the software
and right to amend only with
permission of the patent
holder.
Patentability of software?
Definition of Patentable Invention:
1) New;
2) Inventive step;
3) Industrially applicable.
However, programs for computers as such shall not be patentable (Article 52(2) European Patent Convention).
What does that mean? The invention must be more than the "normal" physical interaction between a program and
computer.
Difficult to obtain a software patent?
When infringed?
Value of patent system for software
Artificial Intelligence makes automated code
creation possible. The processes which
patents protect, as opposed to the source
code that copyright protects, are therefore
becoming more important
Attract investors
Use as a shield, as leverage and to your own
liking
Trade Secret
The principles
• Invention or source code is
kept a secret;
• Monopoly to use for unlimited
period of time until becomes
public knowledge.
What does new trade secret protection entail?
Article 2 Directive 2016/943 of 8 June 2016 and article 1 Law
on the Protection of Trade Secrets (Wet bescherming
bedrijfsgeheimen)
a) it is secret in the sense that it is not, as a body or in the precise
configuration and assembly of its components, generally known
among or readily accessible to persons within the circles that
normally deal with the kind of information in question;
b)commercial value because it is secret;
c) it has been subject to reasonable steps under the circumstances, by
the person lawfully in control of the information, to keep it secret."
Implementation Deadline: 9 June 2018
Limits? (Article 3 of both the Directive and the Dutch Law)
• Reverse engineering, except between two parties;
• Independent discovery;
• Exercise of the right of workers or workers' representatives to
information and consultation in accordance with Union law and
national laws and practices;
• Honest commercial practices.
• In theory: could last forever.
What can be a trade secret?
No interpretation guidelines were given, so we depend on the
CJEU;
Most important: take reasonable steps to keep it a secret, so:
• Confidentiality agreements, non-compete and fines;
• Define trade secrets internally;
• Digital protection;
• No paper trail;
• The bigger the company, the bigger the burden;
• The more professional the party, the more professional the
steps should be.
Infringement and enforcement
Infringement (article 2, 4 Directive; article 1 Dutch law)
• Infringer: any person who new or ought, under the circumstances, to have known that
he has unlawfully acquired, used or disclosed a trade secret;
• Infringing goods: goods, design, characteristics, functioning, production process or
marketing which significantly benefits from trade secrets unlawfully acquired, used or
disclosed.
Slide 11
Value of trade secrets for software
• Jump start;
• Attract investors;
• Broader applicability and protection in more
countries than patents;
• Cheaper than patent.
OSS Patent Trade Secret
Sharing knowhow Yes, source code Yes, invention No
Enriching public
domain
Yes, immediately Yes, after 20 years No
Costs Investment
Investment, filing and
renewal costs
Investment
Protects
Source code via
copyright
Computer
implemented
invention
Anything related to
software, as long as it
is kept secret and not
reverse engineereable
Combination with
other rights on
intertwined
(derivative)
software?
Copyleft: no, unless
not distributed then in
combination with TS
and patent;
Permissable: yes, with
patent, non-OS
copyright and TS
Distributed: yes, with
TS, non-OS copyright
and with permissible
OSS;
Not distributed: also
with copyleft OSS
Distributed: yes, with
patent, non-OS
copyright and with
permissible OSS;
Not distributed: also
with copyleft OSS
Combination with
other rights on
same product with
non-intertwined
software?
Yes Yes Yes
Compare chart
The marriages
Possible marriages Impossible marriage
But even possible marriages are hard work…
Internal policy:
• What software is not and will never be for distribution? What
to do when in doubt?;
• Inventory of trade secrets, patents and open source
developments;
• Screen permissive and copyleft OSS licenses of OSS meant for
distribution;
• Decide if you want to obtain patents to protect yourself;
Head out of the sand:
• Awareness training;
• Developers and legal should be partners;
But even possible marriages are hard work…
Confidentiality and non-compete with penalty for:
• Persons hired for development of software not meant for
distribution;
• Employees who work with OSS, patent and/or trade secret
development within company;
Warranties from suppliers:
• Warranty from that no third party IP rights or trade secrets are
infringed;
• Warranty that no copyleft OSS is used if meant for distribution
and in combination with trade secret and/or patent;
Read OSS license with special attention to:
• Fragmentation of such licenses;
• Lack of applicable law, but often drafted from a US law
perspective;
• Guarantees are not always included;
• What will you be using the OSS for?
twobirds.com
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and
regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 12 New Fetter Lane, London EC4A 1JP. A
list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is
open to inspection at that address.
Thank you
Fenna Douwenga
Fenna.douwenga@twobirds.com
+31 6 5271 4898

More Related Content

What's hot

Notable Legal Developments in Open Source
Notable Legal Developments in Open SourceNotable Legal Developments in Open Source
Notable Legal Developments in Open SourceBlack Duck by Synopsys
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIEC-Council
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...FinTech Belgium
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Fundamental IP and Privacy Issues in M&A Transactions
Fundamental IP and Privacy Issues in M&A TransactionsFundamental IP and Privacy Issues in M&A Transactions
Fundamental IP and Privacy Issues in M&A TransactionsWinston & Strawn LLP
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Black Duck by Synopsys
 

What's hot (20)

Notable Legal Developments in Open Source
Notable Legal Developments in Open SourceNotable Legal Developments in Open Source
Notable Legal Developments in Open Source
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
Computer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFIComputer Hacking Forensic Investigator - CHFI
Computer Hacking Forensic Investigator - CHFI
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
IoT PPT Deck
IoT PPT DeckIoT PPT Deck
IoT PPT Deck
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Select idps
Select idpsSelect idps
Select idps
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Fundamental IP and Privacy Issues in M&A Transactions
Fundamental IP and Privacy Issues in M&A TransactionsFundamental IP and Privacy Issues in M&A Transactions
Fundamental IP and Privacy Issues in M&A Transactions
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
 

Similar to FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossible Marriage?

Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)Arlen Meyers, MD, MBA
 
Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09Gordon Murray
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineeringwelcometofacebook
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsMani Soft International
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 Basireesha
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...Kyiv National Economic University
 
7 golden rules for patenting software inventions 160621
7 golden rules for patenting software inventions 1606217 golden rules for patenting software inventions 160621
7 golden rules for patenting software inventions 160621Martin Schweiger
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?Jennifer O'Neill
 
Intellectual Property Strategy Maximising value fr.docx
Intellectual Property Strategy   Maximising value fr.docxIntellectual Property Strategy   Maximising value fr.docx
Intellectual Property Strategy Maximising value fr.docxvrickens
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)StudsPlanet.com
 
Intellectual Property Rights for Business
Intellectual Property Rights for Business Intellectual Property Rights for Business
Intellectual Property Rights for Business Ritu Sah
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamEversheds Sutherland
 
Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11Andrew Katz
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonEversheds Sutherland
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesSecureDocs
 

Similar to FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossible Marriage? (20)

Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)Kko   ip due diligence presentation (digital boot camp) 2016-02-17(2)
Kko ip due diligence presentation (digital boot camp) 2016-02-17(2)
 
Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09Cork Open Coffee David Reilly 24 July 09
Cork Open Coffee David Reilly 24 July 09
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Legal aspect of IT contracts
Legal aspect of IT contractsLegal aspect of IT contracts
Legal aspect of IT contracts
 
international laws and reverse engineering
international laws and reverse engineeringinternational laws and reverse engineering
international laws and reverse engineering
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 BC:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
C:\Documents And Settings\User\Desktop\Wipo Smes Sha 04 10 B
 
10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...10 things to know about the intersection of blockchain technology, open sourc...
10 things to know about the intersection of blockchain technology, open sourc...
 
7 golden rules for patenting software inventions 160621
7 golden rules for patenting software inventions 1606217 golden rules for patenting software inventions 160621
7 golden rules for patenting software inventions 160621
 
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?
 
Intellectual Property Strategy Maximising value fr.docx
Intellectual Property Strategy   Maximising value fr.docxIntellectual Property Strategy   Maximising value fr.docx
Intellectual Property Strategy Maximising value fr.docx
 
Intellectual property rights (2)
Intellectual property rights (2)Intellectual property rights (2)
Intellectual property rights (2)
 
Out
OutOut
Out
 
Intellectual Property Rights for Business
Intellectual Property Rights for Business Intellectual Property Rights for Business
Intellectual Property Rights for Business
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11Transfer summit presentation (mobile) 06 09 11
Transfer summit presentation (mobile) 06 09 11
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 

More from Black Duck by Synopsys

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubBlack Duck by Synopsys
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...Black Duck by Synopsys
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...Black Duck by Synopsys
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...Black Duck by Synopsys
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub Black Duck by Synopsys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Black Duck by Synopsys
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Black Duck by Synopsys
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...Black Duck by Synopsys
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming Black Duck by Synopsys
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsBlack Duck by Synopsys
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Black Duck by Synopsys
 

More from Black Duck by Synopsys (20)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...Open Source Insight:GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
Open Source Insight: SCA for DevOps, DHS Security, Securing Open Source for G...
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossible Marriage?

  • 1. Open Source Software, IP and trade secrets: an impossible marriage? Fenna Douwenga
  • 2. Contents 1) Open Source Software (OSS) licenses 2) Software Patents 3) Trade Secrets on software Three contradicting ways to deal with the fact that information wants to be free Photographs in this presentation were made available by Pexels.com and Pixabay.com under Creative Commons Zero (CC0) license
  • 3. Open Source Software and OSS licenses The principles • Source code is made available; • Free distribution of the software; • Right to amend the source code; • Based on copyright.
  • 4. Relevant facts relating to OSS licenses • Many types of OSS licenses within the copyleft and permissive license spectrum, but around 50% are GPL licenses; • US law is most commonly used; • ~85% of companies and their developers use OSS; • Convergence of OSS and proprietary software is more and more common; • GPLv3 forbids invoking patents by contributors of the OSS against the OSS licensed under GPLv3 (article 11, 3rd paragraph), also any patent license to one member of the community, is granted for all recipients of the covered work (article 11, 5th paragraph); • GPL v3 does not include a specific reference to trade secrets; • Limitations of OSS licenses only apply after distribution.
  • 5. Patents The principles • Description of invention is made available; • Monopoly for limited period of time; • Distribution of the software and right to amend only with permission of the patent holder.
  • 6. Patentability of software? Definition of Patentable Invention: 1) New; 2) Inventive step; 3) Industrially applicable. However, programs for computers as such shall not be patentable (Article 52(2) European Patent Convention). What does that mean? The invention must be more than the "normal" physical interaction between a program and computer. Difficult to obtain a software patent? When infringed?
  • 7. Value of patent system for software Artificial Intelligence makes automated code creation possible. The processes which patents protect, as opposed to the source code that copyright protects, are therefore becoming more important Attract investors Use as a shield, as leverage and to your own liking
  • 8. Trade Secret The principles • Invention or source code is kept a secret; • Monopoly to use for unlimited period of time until becomes public knowledge.
  • 9. What does new trade secret protection entail? Article 2 Directive 2016/943 of 8 June 2016 and article 1 Law on the Protection of Trade Secrets (Wet bescherming bedrijfsgeheimen) a) it is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question; b)commercial value because it is secret; c) it has been subject to reasonable steps under the circumstances, by the person lawfully in control of the information, to keep it secret." Implementation Deadline: 9 June 2018 Limits? (Article 3 of both the Directive and the Dutch Law) • Reverse engineering, except between two parties; • Independent discovery; • Exercise of the right of workers or workers' representatives to information and consultation in accordance with Union law and national laws and practices; • Honest commercial practices. • In theory: could last forever.
  • 10. What can be a trade secret? No interpretation guidelines were given, so we depend on the CJEU; Most important: take reasonable steps to keep it a secret, so: • Confidentiality agreements, non-compete and fines; • Define trade secrets internally; • Digital protection; • No paper trail; • The bigger the company, the bigger the burden; • The more professional the party, the more professional the steps should be.
  • 11. Infringement and enforcement Infringement (article 2, 4 Directive; article 1 Dutch law) • Infringer: any person who new or ought, under the circumstances, to have known that he has unlawfully acquired, used or disclosed a trade secret; • Infringing goods: goods, design, characteristics, functioning, production process or marketing which significantly benefits from trade secrets unlawfully acquired, used or disclosed. Slide 11
  • 12. Value of trade secrets for software • Jump start; • Attract investors; • Broader applicability and protection in more countries than patents; • Cheaper than patent.
  • 13. OSS Patent Trade Secret Sharing knowhow Yes, source code Yes, invention No Enriching public domain Yes, immediately Yes, after 20 years No Costs Investment Investment, filing and renewal costs Investment Protects Source code via copyright Computer implemented invention Anything related to software, as long as it is kept secret and not reverse engineereable Combination with other rights on intertwined (derivative) software? Copyleft: no, unless not distributed then in combination with TS and patent; Permissable: yes, with patent, non-OS copyright and TS Distributed: yes, with TS, non-OS copyright and with permissible OSS; Not distributed: also with copyleft OSS Distributed: yes, with patent, non-OS copyright and with permissible OSS; Not distributed: also with copyleft OSS Combination with other rights on same product with non-intertwined software? Yes Yes Yes Compare chart
  • 14. The marriages Possible marriages Impossible marriage
  • 15. But even possible marriages are hard work… Internal policy: • What software is not and will never be for distribution? What to do when in doubt?; • Inventory of trade secrets, patents and open source developments; • Screen permissive and copyleft OSS licenses of OSS meant for distribution; • Decide if you want to obtain patents to protect yourself; Head out of the sand: • Awareness training; • Developers and legal should be partners;
  • 16. But even possible marriages are hard work… Confidentiality and non-compete with penalty for: • Persons hired for development of software not meant for distribution; • Employees who work with OSS, patent and/or trade secret development within company; Warranties from suppliers: • Warranty from that no third party IP rights or trade secrets are infringed; • Warranty that no copyleft OSS is used if meant for distribution and in combination with trade secret and/or patent; Read OSS license with special attention to: • Fragmentation of such licenses; • Lack of applicable law, but often drafted from a US law perspective; • Guarantees are not always included; • What will you be using the OSS for?
  • 17. twobirds.com Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses. Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 12 New Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address. Thank you Fenna Douwenga Fenna.douwenga@twobirds.com +31 6 5271 4898