Blog

Tips & tricks for happy software development, deployment and licensing.

    Enterprise, Source Code Escrow

    Best Practices for Software Escrow in Licensing Agreements

     

    Are you aware that you need to implement software escrow in your licensing agreements, but don’t know the best way to start? Then this is exactly the article for you.

    Below you will find information on what a software escrow is, why you need them in your licensing agreements, and what the best way to use them is.

     


     
     
    What is a software escrow?
     


    Software escrow is a service that helps protect all of the parties involved in a software license. The service is offered by a third-party that acts as a neutral agent to hold the source code, data, and technical documentation. The licensing agreement typically defines a mutually-agreed-upon event that triggers the release of information from the software escrow to a legally entitled party.
         

    You can learn more about how a software escrow works by visiting the Codekeeper website.

     

    Enterprise, Source Code Escrow

    Software Verification: What Is It?

     

    Software verification is an essential step in the process of deploying new and updated software. This article goes over what exactly software verification is, how to know if you’re doing it and doing it properly, and how to recognise your own inefficient practices and turn them around for better deployments.

    Let’s get started with pinpointing precisely what is meant by software verification.

     


     
     
    What is software verification?
           


    Some people get software verification confused with software validation, but they’re not exactly the same thing. Each of them is a component of software testing.
    Software validation is the process of evaluating software towards the end of the development process in order to determine whether it satisfies specified business requirements. Software verification, however, is the process of evaluating the in-work product at specific development phases in order to determine whether it meets the specified requirements for that phase.


    Put simply, software verification is asking yourself the question, “Are we building the product right?” It’s something you should be doing along the way. Or in other words, software validation is comparing what you built to the requirements you set for the product. Software verification is about analysing the process you used to build your software. So how do you determine that?

    Here’s our take on it.

     

    Enterprise, Source Code Escrow

    How I Saved $50,000 on Outsourcing

     

    Are you thinking about outsourcing, but are concerned how effective or cost efficient it will be?? That’s understandable. Many managers and business owners struggle to decide whether outsourcing is the right choice for their company or not.
    Fortunately, there are other companies that have already made their decision to outsource, and they can share their experiences with you.

    This article takes a look at one company that saved over $50,000 by outsourcing part of their activities and talks about how you can get started on the same path towards greater savings and improved efficiency.

     


     
     
    Ovia Health saved $50,000 by outsourcing bookkeeping services
     


    It’s no secret that in order to grow and reduce costs, companies need to be able to automate as many processes as possible. This is just as true for development processes as it is for other business processes.


    For Ovia Health, their accounting department was getting stuck with manual tasks. They enlisted the help of an accounting automation solution called Bookkeeper, and the service costs them a fraction of what it would cost to employ full-time accounting personnel.

    According to Ovia Health, the investment for new accounting software would have been about $50,000 for just the first year, plus the cost of hiring another bookkeeper to manage it.

    You could realise the same kinds of savings by outsourcing development.

     

    Enterprise, Source Code Escrow

    The Ultimate Guide to Software and Source Code Escrow - Chapter 2

     

    Who’s who in a software escrow agreement?

    We use the following terms interchangeably throughout this article:

    The licensor is typically a software developer or vendor who deposits source code and other materials into escrow. They're also referred to as the depositor. The client, or the authorized end-user, is typically  referred to as the beneficiary or licensee. A neutral third party, such as Codekeeper, typically serves as the escrow agent, providing secure storage of the source code and other materials, and making available (releasing) the contents of an escrow account to its beneficiary (or, beneficiaries) — upon a release condition being met.

     


     
     

    Depositor or Licensor

    Typically, the depositor/licensor tends to be a smaller software development team in comparison to their beneficiary counterpart. Once one of their clients begins to rely more heavily on their software for operations, concerns usually arise over the continuity and security of that system. 

     

    During renegotiation of their licensing agreement, the client might request that the system in question be deposited into escrow. Should any adverse, unforeseen event take place, the client will be able to retrieve the valuable code and IP, and resume operations as usual.


    These smaller development teams can also use software escrow as a selling point for their services, reassuring potential clients that if anything happens to the firm, the IP is secure in storage, up to date, and ready to be released once a trigger event takes place. 

    Enterprise, Source Code Escrow

    6 Tips for Securing Your Development Outsourcing

     

    If you’re thinking about outsourcing your development, you must surely be wondering about how to keep your data secured.
    Data breaches are a real danger that can lead to fines and a damaged reputation. It's very important to understand how your data is being handled by everyone you work with, especially when working with agencies in different countries where the laws may differ.


    This article gives you six tips on securing your development outsourcing. These tips include protecting your intellectual property (IP), asking about security certifications, limiting privileges, forming an airtight agreement, and preventing breaches.

     


     
     

    Protect Your Intellectual Property

    Before outsourcing your development, you must be familiar with intellectual property laws. If you’re outsourcing out of your country, you will also need to review the intellectual property protection laws in that country.

    You can then discuss intellectual property policies with your selected agency. You will want to make sure they understand the laws and that they follow the rules.
    Ask about their security measures around intellectual property protection. For example, do their employees sign non-disclosure agreements (NDA)? The agency should be able to provide these details in-depth. If not, take it as a red flag. You can also discuss discrepancies and have your lawyer add this to your contract.


    The agency should be able to provide these details in-depth. If not, take it as a red flag. You can also discuss discrepancies and have your lawyer add this to your contract.

    1