๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Protecting software and confidential information

โœ Scribed by John Warchus


Publisher
Elsevier Science
Year
1999
Tongue
English
Weight
234 KB
Volume
15
Category
Article
ISSN
0267-3649

No coin nor oath required. For personal study only.

โœฆ Synopsis


This important recent decision has illustrated the approach taken by English Courts to allegations of infringement of copyright in software programs and has also explained the use which can be made by former employees of confidential information in an IT setting.

The main parties to this action were both inter-deal brokers in bonds whose business was heavily dependent upon the operation of computer programs. The Claimant alleged that copyright in its bond-broking software had been infringed when a number of its directors and programmers left to join the defendant company and developed a rival broking system.The Managing Director and programmers were joined as additional defendants. Although the Claimant was partly successful in its allegations of infringement of copyright and breach of confidential information, the judgment of Mr Justice Pumfrey given on 15 April 1999 indicates that Tradition was, overall, the successful party. Unfortunately, the Judgment does not record the actual award of damages made.


๐Ÿ“œ SIMILAR VOLUMES


Reverse analysis and confidentiality of
โœ David Bainbridge ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 381 KB

Mars UK Ltd vTeknowledge Ltd 11 June 1999, Chancery Division, is an important case involving allegations of infringement of copyright and database right in addition to an allegation of breach of confidence. It has implications for reverse engineering of computer software and whether encrypted softwa

Is your auditor protecting your confiden
โœ Abbie Gail Parham; Leslie B. Fletcher; A. Lee Gurley III ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 342 KB

## Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should t