Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Preserving the Crown Jewels: Practical Strategies for Protecting Source Code in Patent Litigation Discovery

By Douglas E. Lumish and Matthew M. Sarboraria
August 09, 2004

In today's Internet age, the most valuable asset belonging to many of the world's most successful organizations is “source code” ' the programming underlying all software operating systems, databases, and applications. As a result, keeping source code from leaking to the public is of paramount concern, especially in light of the fact that source code published over the Internet can proliferate at an exponential pace with little more than a series of mouse clicks. If confidential code is released into the public domain, even inadvertently, it risks losing any trade secret protection it once enjoyed. See, e.g., Linkco, Inc. v. Fujitsu Ltd., 230 F. Supp. 2d 492, 498-99 (S.D.N.Y. 2002). In short, once the “genie” is out of the bottle, it cannot be put back in.

To preserve the secrecy of their source code, many companies impose strict security policies on their own employees. As an example, code may be restricted to a small number of secure facilities, computers, and company employees who have a specific need for access. Even employees that do gain access may be prevented from viewing or downloading a full copy of the source code, but may be restricted instead only to necessary portions of the code. Furthermore, password protection, copy protection, and source control software are ubiquitous ' making unauthorized access difficult while keeping close track of who last “checked in” and “checked out” source code from a secure server.

Read These Next
Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About It Image

Why is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?

Bankruptcy Sales: Finding a Diamond In the Rough Image

There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.

The DOJ's Corporate Enforcement Policy: One Year Later Image

The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.

A Lawyer's System for Active Reading Image

Active reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.

Protecting Innovation in the Cyber World from Patent Trolls Image

With trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.