Protecting software and confidential information
โ Scribed by John Warchus
- Publisher
- Elsevier Science
- Year
- 1999
- Tongue
- English
- Weight
- 234 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0267-3649
No coin nor oath required. For personal study only.
โฆ Synopsis
This important recent decision has illustrated the approach taken by English Courts to allegations of infringement of copyright in software programs and has also explained the use which can be made by former employees of confidential information in an IT setting.
The main parties to this action were both inter-deal brokers in bonds whose business was heavily dependent upon the operation of computer programs. The Claimant alleged that copyright in its bond-broking software had been infringed when a number of its directors and programmers left to join the defendant company and developed a rival broking system.The Managing Director and programmers were joined as additional defendants. Although the Claimant was partly successful in its allegations of infringement of copyright and breach of confidential information, the judgment of Mr Justice Pumfrey given on 15 April 1999 indicates that Tradition was, overall, the successful party. Unfortunately, the Judgment does not record the actual award of damages made.
๐ SIMILAR VOLUMES
Mars UK Ltd vTeknowledge Ltd 11 June 1999, Chancery Division, is an important case involving allegations of infringement of copyright and database right in addition to an allegation of breach of confidence. It has implications for reverse engineering of computer software and whether encrypted softwa
## Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should t