Posts Tagged: "software code"

Supplying Legal Notices for Free Software in your Products

This license, like many other Free Software licenses, require a legal notice to be given to the recipient when the software is distributed. Alas, it seems like Intel has not done so and as a result the distribution of Minix 3 inside the recent Intel CPUs could be copyright infringement… How can you pirate Free Software? Simple, if you do not comply with the terms and conditions of a Free Software license, then you have no right to distribute the software… Even though people who create Free Software might not necessarily be interested in monetary compensation, they are however usually interested in being named as the author. This is a right which is also part of copyright law in many jurisdictions.

How to Participate in Open Source While Maintaining IP Integrity

The key idea is to think strategically about the software, the value it can provide to the company, and whether the technology should be developed in-house. In some cases, software can provide more value to the company when it includes open source components. Here at Dropbox, for example, we use open source software in our products and we use it to help with development… Even here there are a few ground rules: We evaluate the code on the way in so we know what has been incorporated in our software later. And we prohibit code that is licensed under more restrictive terms that could require us to open source our product in turn.

It is time for Judge Mayer to Step Down from the Federal Circuit

Simply stated, the industry and the public deserve better than Judge Mayer. His anti-patent views so cloud his judgment that he twists, exaggerates and misrepresents in order to attempt to impose his radical views into the law. There is no place for a judge like that. It is time for him to leave the Court. If he chooses not to do that it would seem appropriate for the Court to do what they would with an attorney who grossly exaggerates and mischaracterizes cases and rulings.

Source Code Review: Mitigating Risks and Reducing Costs

Source Code Review is the most powerful tool in a litigator’s war chest in patent and trade secrets cases. An important consequence of the judicial climate shifting farther away from business methods and closer to technically complex IP is that receiving parties now face a higher burden of proof and subsequently higher legal costs. Not only are receiving parties now required to be more diligent prior to a case filing but they also end up spending extra thousands of dollars reviewing millions of lines of code to successfully formulating their infringement arguments. A significant cost and exposure risk can be avoided simply by a diligent assessment on both sides as to what source code needs to be produced to the receiving party.

NY v. Aleynikov: NY Penal Code, Federal Criminal Law Unprepared to Deal with Source Code Theft

Employers often assume that they have the same weapons in their arsenal to prevent theft of virtual trade secrets as they have against other types of loss. As the prosecution of Sergey Aleynikov in Federal and New York courts showed, however, that simply isn’t true. Even though juries in both courts found him guilty of downloading confidential computer code from his employer, judges ultimately found that the laws under which he was prosecuted did not cover the acts he committed. A careful employer should therefore make sure it puts precautions in place that prevent theft of computer code, rather than relying on the threat of criminal prosecution.

Aleynikov was a computer programmer employed by Goldman Sachs to write high-frequency trading code. In 2009, he accepted a job offer to join a potential competitor, where he would create a new high-frequency trading platform from the ground up. Before he left Goldman, however, he sent portions of Goldman’s high frequency trading code to a German server for his own future use. After Goldman found out, it went to the FBI; Aleynikov was then arrested on a flight home from a visit to Chicago. With that arrest began his circuitous journey through the U.S. legal system, governed by two different sovereigns and under two different legal regimes.