Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Legalities Question

Legalities Question

Scheduled Pinned Locked Moved The Lounge
securityhelpquestionbusinessperformance
55 Posts 27 Posters 4 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • realJSOPR Offline
    realJSOPR Offline
    realJSOP
    wrote on last edited by
    #1

    Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

    .45 ACP - because shooting twice is just silly
    -----
    "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
    -----
    "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

    D B N R P 13 Replies Last reply
    0
    • realJSOPR realJSOP

      Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

      .45 ACP - because shooting twice is just silly
      -----
      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
      -----
      "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

      D Offline
      D Offline
      Dalek Dave
      wrote on last edited by
      #2

      You would need specific legal advice, but a general rule of thumb is all things done whilst you were employed by the company belong to that company unless explicitly stated otherwise. Even if the company has folded, this would still be seen as an asset for administrative purposes. I write as an accountant, not a lawyer. If there were debts owed when this company crashed, then this software may be sold/licenced to cover these debts, the liquidators would ensure all assets were realised efficiently. Alternatively, you could write something 'similar' but not close enough to be infringing, (look and feel), and that may be ok. As I say, take professional advice on this.

      ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

      realJSOPR S 2 Replies Last reply
      0
      • realJSOPR realJSOP

        Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

        .45 ACP - because shooting twice is just silly
        -----
        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
        -----
        "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

        B Offline
        B Offline
        Brady Kelly
        wrote on last edited by
        #3

        I sort of remember reading somewhere that copyright still exists as property of the 'remains' of the company, i.e. the creditors in a liquidation, or the partners as individuals if the voluntarily wound up the company. However, don't take the word of an IP law student who missed most exams this semester and didn't get enough rdeading about the subject in time. I would check it out further if I was you.

        P 1 Reply Last reply
        0
        • D Dalek Dave

          You would need specific legal advice, but a general rule of thumb is all things done whilst you were employed by the company belong to that company unless explicitly stated otherwise. Even if the company has folded, this would still be seen as an asset for administrative purposes. I write as an accountant, not a lawyer. If there were debts owed when this company crashed, then this software may be sold/licenced to cover these debts, the liquidators would ensure all assets were realised efficiently. Alternatively, you could write something 'similar' but not close enough to be infringing, (look and feel), and that may be ok. As I say, take professional advice on this.

          ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

          realJSOPR Offline
          realJSOPR Offline
          realJSOP
          wrote on last edited by
          #4

          Dalek Dave wrote:

          Alternatively, you could write something 'similar' but not close enough to be infringing

          Well it would be similar but not exactly the same since I'd be going off my memory, as well as having a couple of additional years of .Net experience under my belt.

          .45 ACP - because shooting twice is just silly
          -----
          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
          -----
          "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

          L 2 Replies Last reply
          0
          • B Brady Kelly

            I sort of remember reading somewhere that copyright still exists as property of the 'remains' of the company, i.e. the creditors in a liquidation, or the partners as individuals if the voluntarily wound up the company. However, don't take the word of an IP law student who missed most exams this semester and didn't get enough rdeading about the subject in time. I would check it out further if I was you.

            P Offline
            P Offline
            peterchen
            wrote on last edited by
            #5

            Matches my limited not-even-IP-law-student understanding.

            Personally, I love the idea that Raymond spends his nights posting bad regexs to mailing lists under the pseudonym of Jane Smith. He'd be like a super hero, only more nerdy and less useful. [Trevel]
            | FoldWithUs! | sighist | µLaunch - program launcher for server core and hyper-v server

            1 Reply Last reply
            0
            • realJSOPR realJSOP

              Dalek Dave wrote:

              Alternatively, you could write something 'similar' but not close enough to be infringing

              Well it would be similar but not exactly the same since I'd be going off my memory, as well as having a couple of additional years of .Net experience under my belt.

              .45 ACP - because shooting twice is just silly
              -----
              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
              -----
              "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

              L Offline
              L Offline
              Lost User
              wrote on last edited by
              #6

              John Simmons / outlaw programmer wrote:

              Well it would be similar but not exactly the same

              Unfortunately this can be a somewhat subjective view, particularly in the field of software patents. The company may still be able to claim that you copied 'their' design (even though you designed it in the first place). As DD says, take professional advice before publishing your article.

              1 Reply Last reply
              0
              • realJSOPR realJSOP

                Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

                .45 ACP - because shooting twice is just silly
                -----
                "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                -----
                "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                N Offline
                N Offline
                Nish Nishant
                wrote on last edited by
                #7

                With your 2 years of added .NET and WCF experience, you may actually be able to considerably improve on your original code thus making it quite different from the version you wrote for your company. So that might be another consideration.

                Regards, Nish


                Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                My latest book : C++/CLI in Action / Amazon.com link

                R R 2 Replies Last reply
                0
                • N Nish Nishant

                  With your 2 years of added .NET and WCF experience, you may actually be able to considerably improve on your original code thus making it quite different from the version you wrote for your company. So that might be another consideration.

                  Regards, Nish


                  Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                  My latest book : C++/CLI in Action / Amazon.com link

                  R Offline
                  R Offline
                  Rajesh R Subramanian
                  wrote on last edited by
                  #8

                  Excellent suggestion!

                  “Follow your bliss.” – Joseph Campbell

                  1 Reply Last reply
                  0
                  • N Nish Nishant

                    With your 2 years of added .NET and WCF experience, you may actually be able to considerably improve on your original code thus making it quite different from the version you wrote for your company. So that might be another consideration.

                    Regards, Nish


                    Nish’s thoughts on MFC, C++/CLI and .NET (my blog)
                    My latest book : C++/CLI in Action / Amazon.com link

                    R Offline
                    R Offline
                    Rama Krishna Vavilala
                    wrote on last edited by
                    #9

                    The legal issue is not of the code but of technique. The code might be different but the technique might be same, so that will be a problem.

                    R realJSOPR U 3 Replies Last reply
                    0
                    • R Rama Krishna Vavilala

                      The legal issue is not of the code but of technique. The code might be different but the technique might be same, so that will be a problem.

                      R Offline
                      R Offline
                      Rajesh R Subramanian
                      wrote on last edited by
                      #10

                      Rama Krishna Vavilala wrote:

                      The code might be different but the technique might be same, so that will be a problem.

                      That's exactly what Nish asks him to change (to make it far better, and thereby possibly different).

                      “Follow your bliss.” – Joseph Campbell

                      R 1 Reply Last reply
                      0
                      • realJSOPR realJSOP

                        Dalek Dave wrote:

                        Alternatively, you could write something 'similar' but not close enough to be infringing

                        Well it would be similar but not exactly the same since I'd be going off my memory, as well as having a couple of additional years of .Net experience under my belt.

                        .45 ACP - because shooting twice is just silly
                        -----
                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                        -----
                        "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                        L Offline
                        L Offline
                        Lost User
                        wrote on last edited by
                        #11

                        Do you have any documentation from the original project that you are referring to? It could be a consideration (but don't trust me on this!).

                        Join the cool kids - Come fold with us[^]

                        realJSOPR 1 Reply Last reply
                        0
                        • R Rajesh R Subramanian

                          Rama Krishna Vavilala wrote:

                          The code might be different but the technique might be same, so that will be a problem.

                          That's exactly what Nish asks him to change (to make it far better, and thereby possibly different).

                          “Follow your bliss.” – Joseph Campbell

                          R Offline
                          R Offline
                          Rama Krishna Vavilala
                          wrote on last edited by
                          #12

                          No, I don’t think that will count as a new technique. Consider MD5 hashing, it is a technique and it can be implemented in several ways: using C++/C#/VB.NET/JavaScript. Some of those implementations may be far better than other or radically different, but the overall concept behind MD5 remains the same.

                          R 1 Reply Last reply
                          0
                          • R Rama Krishna Vavilala

                            No, I don’t think that will count as a new technique. Consider MD5 hashing, it is a technique and it can be implemented in several ways: using C++/C#/VB.NET/JavaScript. Some of those implementations may be far better than other or radically different, but the overall concept behind MD5 remains the same.

                            R Offline
                            R Offline
                            Rajesh R Subramanian
                            wrote on last edited by
                            #13

                            In other words, John is in a soup? :)

                            “Follow your bliss.” – Joseph Campbell

                            1 Reply Last reply
                            0
                            • L Lost User

                              Do you have any documentation from the original project that you are referring to? It could be a consideration (but don't trust me on this!).

                              Join the cool kids - Come fold with us[^]

                              realJSOPR Offline
                              realJSOPR Offline
                              realJSOP
                              wrote on last edited by
                              #14

                              Yeah, I have design documentation that I wrote, as well as the document that I wrote and presented to a venture capitalist.

                              .45 ACP - because shooting twice is just silly
                              -----
                              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                              -----
                              "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                              L 1 Reply Last reply
                              0
                              • realJSOPR realJSOP

                                Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

                                .45 ACP - because shooting twice is just silly
                                -----
                                "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                -----
                                "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                R Offline
                                R Offline
                                Rama Krishna Vavilala
                                wrote on last edited by
                                #15

                                Dalek Dave is right on all counts. I had a discussion about a lawyer regarding Intellectual Property. His summary was as following:- 1. As long as you are developing for a company using the company’s equipment and time. The code and the technique belongs to the company. 2. The company is out of business does not mean that there is no one who owns the IP. 3. If the encryption utility is proprietary and it is not a commonly understood way of solving a problem, you have no rights to it.

                                L 1 Reply Last reply
                                0
                                • R Rama Krishna Vavilala

                                  Dalek Dave is right on all counts. I had a discussion about a lawyer regarding Intellectual Property. His summary was as following:- 1. As long as you are developing for a company using the company’s equipment and time. The code and the technique belongs to the company. 2. The company is out of business does not mean that there is no one who owns the IP. 3. If the encryption utility is proprietary and it is not a commonly understood way of solving a problem, you have no rights to it.

                                  L Offline
                                  L Offline
                                  Lost User
                                  wrote on last edited by
                                  #16

                                  So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                                  D R 2 Replies Last reply
                                  0
                                  • L Lost User

                                    So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                                    D Offline
                                    D Offline
                                    Dalek Dave
                                    wrote on last edited by
                                    #17

                                    There have been cases like this, and it still belongs to the company. Most contracts will have a clause entitling them to all work, regardless of how when and where. Bummer, but that is what happens.

                                    ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                                    1 Reply Last reply
                                    0
                                    • L Lost User

                                      So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                                      R Offline
                                      R Offline
                                      Rama Krishna Vavilala
                                      wrote on last edited by
                                      #18

                                      harold aptroot wrote:

                                      So what if you develop the encryption utility in your own time and publish it privately

                                      It belongs to you and you can claim prior art.

                                      harold aptroot wrote:

                                      then give a copy of the code to the company?

                                      It depends on the terms and conditions you agreed to when you gave the copy to the company. That being said there are lot of loopholes which makes things even more complicated. Now in John’s case, the company may not even care if he publishes the technique as an article. It depends on how much the code is worth to the company and how much the company is willing to spend in lawyer fees to chase John.

                                      D 1 Reply Last reply
                                      0
                                      • R Rama Krishna Vavilala

                                        harold aptroot wrote:

                                        So what if you develop the encryption utility in your own time and publish it privately

                                        It belongs to you and you can claim prior art.

                                        harold aptroot wrote:

                                        then give a copy of the code to the company?

                                        It depends on the terms and conditions you agreed to when you gave the copy to the company. That being said there are lot of loopholes which makes things even more complicated. Now in John’s case, the company may not even care if he publishes the technique as an article. It depends on how much the code is worth to the company and how much the company is willing to spend in lawyer fees to chase John.

                                        D Offline
                                        D Offline
                                        Dalek Dave
                                        wrote on last edited by
                                        #19

                                        Rama Krishna Vavilala wrote:

                                        It belongs to you and you can claim prior art.

                                        Check your contract! Seriously, employers claim rights over all work, Inspiration Tax I suppose.

                                        ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                                        R B 2 Replies Last reply
                                        0
                                        • D Dalek Dave

                                          Rama Krishna Vavilala wrote:

                                          It belongs to you and you can claim prior art.

                                          Check your contract! Seriously, employers claim rights over all work, Inspiration Tax I suppose.

                                          ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                                          R Offline
                                          R Offline
                                          Rama Krishna Vavilala
                                          wrote on last edited by
                                          #20

                                          Dalek Dave wrote:

                                          Check your contract!

                                          Yep! that’s what I said in my second point.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups