If outsourcing vendor cannot be trusted to protect trade secrets, then the risks of an outsourcing custom software development may outweigh its potential benefits. Hence, it is critical to review the intellectual property policy of the potential supplier.
Maximizing the economic value of an software development asset critically depends on understanding how best to use the available forms of legal regulations to protect intellectual rights. If vendor cannot be trusted to protect trade secrets, then the risks of an outsourcing software development may outweigh its potential benefits. Hence, it is critical to review the intellectual property policy of the potential outsourcing supplier.
According to the World Intellectual Property Organization, offshoring software development means that company A turns over responsibility, in whole or in part, of an in-house software development to company B whose location is outside of company A’s national jurisdiction.
Each type of intellectual property asset may be involved in such relationships:
- Patents for ideas, systems, methods, and functions embodied in a software product;
- Trade secrets (the code with embedded ideas and concepts);
- Copyright and related rights to protect the source code and certain unique elements of the user interface.
The intellectual property protection policy of an outsourcing software development company must be reflected in these crucial documents:
- General Agreement;
- Non-Disclosure Agreement;
- Employee Confidentiality Contract.
General Agreement: How Good Outsourcing Company Should Protect Clients’ Intellectual Property Rights When Doing Work For Hire
We understand the importance of intellectual property to our Clients’ business development. The ownership of intellectual property assets created by our software developers, as a part of the work done for hire, as well as patents, copyrights and all the data related to the Clients and their projects, belongs to our Clients.
This may be reflected in our software development Agreement in the following manner:
The SERVICE PROVIDER transfers to the CUSTOMER property rights on the developed software under an exclusive license. The exclusive right means the right to use the software at its sole discretion in any form and in any way. Exclusive rights are transferred for the whole period of copyrights and act in any territory of the world. Exclusive rights are transferred on a grant basis. The transfer of exclusive rights from the SERVICE PROVIDER to the CUSTOMER is reflected in the Confirmation of services rendered. Date of transfer of exclusive rights is the date of signing the Confirmation of the services rendered by the Parties. The source code of the software is transferred to the CUSTOMER in electronic form to the email address specified in this Agreement or to the server of the CUSTOMER.
Moreover, our Clients’ lawyers feel free to make changes in the Agreement and NDA which are signed prior to the start of any development work.
Non-Disclosure Agreement: How Good Outsourcing Software Development Company Treats Confidential Information During And After The Project
‘To assure that Belitsoft treats intellectual property of its Clients with the ultimate care, we sign a Non-Disclosure Agreement (NDA) with all our Clients at the start of a business relationship.’
Its contents may vary, but would typically contain the following statements:
“Confidential Information" includes all information, technical data, or know-how, including, but not limited to, that which relates to a disclosing party's research, products, hardware, software, designs, inventions, ideas, processes, drawings, business plans, product implementations, financial information, marketing techniques, business operation and systems, pricing policies, information concerning current and possible new employees, customers, and/or vendors disclosed by one party to another in writing, orally, by inspection, or otherwise.
The receiving party and its Representatives shall not disclose any Confidential Information to third parties, in any manner, and shall protect the Confidential Information for five (5) years following the date of its disclosure.
Nothing in this Agreement is intended to grant or imply any rights, by license or otherwise, to either party under any patent, copyright, trade secret, or other intellectual property right, nor shall this Agreement grant or imply to either party any rights in or to the other party's Confidential Information.
The receiving party shall take all measures reasonably necessary to protect the Confidential Information received from the disclosing party, at least as great as the measures it takes to protect its own confidential information.
These Terms and Conditions shall be governed by and construed in accordance with English law. Disputes arising in connection with these Terms and Conditions shall be subject to the exclusive jurisdiction of the English courts.
Employee Confidentiality Contract: Not Only Contract Party But Each Member Of Software Development Company’s Team Should Be Responsible
To assure that all Belitsoft developers are fully aware of the critical importance of protecting Clients’ rights, all Belitsoft developers sign Employee Confidentiality Contract along with their Employee Contract upon joining the company. These contracts would normally state that developers must comply with Belitsoft intellectual property protection policy.
In addition, each developer can sign a personal NDA with the Client directly on demand.
The Bottom Line
“My idea is brilliant, but what is there to stop them from seeing my concept as a lucrative idea, but saying to me 'hey, sorry, but we're not interested' and moving forward with the idea themselves?!' Meanwhile, they have my product in their hands and can tweak it a bit and 'make it their own'. I'll be left with nothing…”
Belitsoft is a business with 17 years of experience on the global market. Dozens of startups and enterprises come to us with innovative ideas every month. We value our reputation highly and would not sacrifice it for the sake of short-term gain.
You can see testimonials of our big and small clients along with other independent reviews they keep giving us. These include healthcare companies and startups who trusted us to work with their highly secure solutions.
Rate this article