Active Escrow

Click the question to reveal the answer, click the question once more to hide.

Print FAQs

Q
What is Active Escrow?
A
Compared to the traditional code escrow business model where
a static point in time snapshot of the code is preserved for
future inspection, Active Escrow introduces the ability for
the party developing the code to upload changes to the
escrowed code thereby enabling the IP owner and IP
Lawyer/Code Inspectors to gain read-only access to the
latest revisions of the escrowed code.

close
Q
What additional feature does Active Escrow provide?
A
Updates to the escrowed code by the party developing the
code and inspection capability for the IP Owner and IP
Lawyer/Code Inspector.

close
Q
What is an inspecting station?
A
An Inspecting Station is a kiosk like software appliance
that enables IP Lawyers/Code Inspectors to search and view
software IP artifacts (like source code) without being able
to make unauthorized copies or modify the IP. They can also
track changes to the IP. The software IP is also always
protected from third party theft while it is resident in the
Inspecting Station.

close
Q
What is the benefit of an Inspecting Station?
A
The software IP is brought to the IP Lawyer/Code
Inspector(s) instead of the IP Lawyer/Code Inspector(s)
having to be brought to the software IP. This could result
in significant cost savings as well as provide 7 X 24 secure
access.

close
Q
What is a Secure Development Environment?
A
A Secure Development Environment or Development Station is a
kiosk like software appliance that enables software
developers to checkout, edit, build, test and commit changes
to various software IP artifacts without being able to make
unauthorized copies of the software IP. The software IP is
also always protected from third party theft while it is
resident in the development station.

close
Q
What is the benefit of a Secure Development Environment?
A
Secure Development Environment brings help make new and
existing outsourcing, offshoring and work-from-home
operations more secure thereby minimizing the probability of
software IP theft.

close
close