Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Legalities Question

Legalities Question

Scheduled Pinned Locked Moved The Lounge
securityhelpquestionbusinessperformance
55 Posts 27 Posters 4 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R Rama Krishna Vavilala

    The legal issue is not of the code but of technique. The code might be different but the technique might be same, so that will be a problem.

    R Offline
    R Offline
    Rajesh R Subramanian
    wrote on last edited by
    #10

    Rama Krishna Vavilala wrote:

    The code might be different but the technique might be same, so that will be a problem.

    That's exactly what Nish asks him to change (to make it far better, and thereby possibly different).

    “Follow your bliss.” – Joseph Campbell

    R 1 Reply Last reply
    0
    • realJSOPR realJSOP

      Dalek Dave wrote:

      Alternatively, you could write something 'similar' but not close enough to be infringing

      Well it would be similar but not exactly the same since I'd be going off my memory, as well as having a couple of additional years of .Net experience under my belt.

      .45 ACP - because shooting twice is just silly
      -----
      "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
      -----
      "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #11

      Do you have any documentation from the original project that you are referring to? It could be a consideration (but don't trust me on this!).

      Join the cool kids - Come fold with us[^]

      realJSOPR 1 Reply Last reply
      0
      • R Rajesh R Subramanian

        Rama Krishna Vavilala wrote:

        The code might be different but the technique might be same, so that will be a problem.

        That's exactly what Nish asks him to change (to make it far better, and thereby possibly different).

        “Follow your bliss.” – Joseph Campbell

        R Offline
        R Offline
        Rama Krishna Vavilala
        wrote on last edited by
        #12

        No, I don’t think that will count as a new technique. Consider MD5 hashing, it is a technique and it can be implemented in several ways: using C++/C#/VB.NET/JavaScript. Some of those implementations may be far better than other or radically different, but the overall concept behind MD5 remains the same.

        R 1 Reply Last reply
        0
        • L Lost User

          Do you have any documentation from the original project that you are referring to? It could be a consideration (but don't trust me on this!).

          Join the cool kids - Come fold with us[^]

          realJSOPR Offline
          realJSOPR Offline
          realJSOP
          wrote on last edited by
          #13

          Yeah, I have design documentation that I wrote, as well as the document that I wrote and presented to a venture capitalist.

          .45 ACP - because shooting twice is just silly
          -----
          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
          -----
          "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

          L 1 Reply Last reply
          0
          • R Rama Krishna Vavilala

            No, I don’t think that will count as a new technique. Consider MD5 hashing, it is a technique and it can be implemented in several ways: using C++/C#/VB.NET/JavaScript. Some of those implementations may be far better than other or radically different, but the overall concept behind MD5 remains the same.

            R Offline
            R Offline
            Rajesh R Subramanian
            wrote on last edited by
            #14

            In other words, John is in a soup? :)

            “Follow your bliss.” – Joseph Campbell

            1 Reply Last reply
            0
            • realJSOPR realJSOP

              Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

              .45 ACP - because shooting twice is just silly
              -----
              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
              -----
              "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

              R Offline
              R Offline
              Rama Krishna Vavilala
              wrote on last edited by
              #15

              Dalek Dave is right on all counts. I had a discussion about a lawyer regarding Intellectual Property. His summary was as following:- 1. As long as you are developing for a company using the company’s equipment and time. The code and the technique belongs to the company. 2. The company is out of business does not mean that there is no one who owns the IP. 3. If the encryption utility is proprietary and it is not a commonly understood way of solving a problem, you have no rights to it.

              L 1 Reply Last reply
              0
              • R Rama Krishna Vavilala

                Dalek Dave is right on all counts. I had a discussion about a lawyer regarding Intellectual Property. His summary was as following:- 1. As long as you are developing for a company using the company’s equipment and time. The code and the technique belongs to the company. 2. The company is out of business does not mean that there is no one who owns the IP. 3. If the encryption utility is proprietary and it is not a commonly understood way of solving a problem, you have no rights to it.

                L Offline
                L Offline
                Lost User
                wrote on last edited by
                #16

                So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                D R 2 Replies Last reply
                0
                • L Lost User

                  So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                  D Offline
                  D Offline
                  Dalek Dave
                  wrote on last edited by
                  #17

                  There have been cases like this, and it still belongs to the company. Most contracts will have a clause entitling them to all work, regardless of how when and where. Bummer, but that is what happens.

                  ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                  1 Reply Last reply
                  0
                  • L Lost User

                    So what if you develop the encryption utility in your own time and publish it privately, and then give a copy of the code to the company?

                    R Offline
                    R Offline
                    Rama Krishna Vavilala
                    wrote on last edited by
                    #18

                    harold aptroot wrote:

                    So what if you develop the encryption utility in your own time and publish it privately

                    It belongs to you and you can claim prior art.

                    harold aptroot wrote:

                    then give a copy of the code to the company?

                    It depends on the terms and conditions you agreed to when you gave the copy to the company. That being said there are lot of loopholes which makes things even more complicated. Now in John’s case, the company may not even care if he publishes the technique as an article. It depends on how much the code is worth to the company and how much the company is willing to spend in lawyer fees to chase John.

                    D 1 Reply Last reply
                    0
                    • R Rama Krishna Vavilala

                      harold aptroot wrote:

                      So what if you develop the encryption utility in your own time and publish it privately

                      It belongs to you and you can claim prior art.

                      harold aptroot wrote:

                      then give a copy of the code to the company?

                      It depends on the terms and conditions you agreed to when you gave the copy to the company. That being said there are lot of loopholes which makes things even more complicated. Now in John’s case, the company may not even care if he publishes the technique as an article. It depends on how much the code is worth to the company and how much the company is willing to spend in lawyer fees to chase John.

                      D Offline
                      D Offline
                      Dalek Dave
                      wrote on last edited by
                      #19

                      Rama Krishna Vavilala wrote:

                      It belongs to you and you can claim prior art.

                      Check your contract! Seriously, employers claim rights over all work, Inspiration Tax I suppose.

                      ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                      R B 2 Replies Last reply
                      0
                      • D Dalek Dave

                        Rama Krishna Vavilala wrote:

                        It belongs to you and you can claim prior art.

                        Check your contract! Seriously, employers claim rights over all work, Inspiration Tax I suppose.

                        ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                        R Offline
                        R Offline
                        Rama Krishna Vavilala
                        wrote on last edited by
                        #20

                        Dalek Dave wrote:

                        Check your contract!

                        Yep! that’s what I said in my second point.

                        1 Reply Last reply
                        0
                        • D Dalek Dave

                          Rama Krishna Vavilala wrote:

                          It belongs to you and you can claim prior art.

                          Check your contract! Seriously, employers claim rights over all work, Inspiration Tax I suppose.

                          ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                          B Offline
                          B Offline
                          Brady Kelly
                          wrote on last edited by
                          #21

                          Dalek Dave wrote:

                          Seriously, employers claim rights over all work

                          There is a provision somewhere in SA IP law, that I can't currently find, that nullifies any contractual claim on the part of the employer to work done by an employee outside of his duties to the employer. I have a pressing deadline so I can't spend too much time looking for it.

                          D 1 Reply Last reply
                          0
                          • B Brady Kelly

                            Dalek Dave wrote:

                            Seriously, employers claim rights over all work

                            There is a provision somewhere in SA IP law, that I can't currently find, that nullifies any contractual claim on the part of the employer to work done by an employee outside of his duties to the employer. I have a pressing deadline so I can't spend too much time looking for it.

                            D Offline
                            D Offline
                            Dalek Dave
                            wrote on last edited by
                            #22

                            Ah yes, well, different legal systems have different rights and obligations, but UK law does give the employer rights to all work within the contract. You can always alter the contract before signing it.

                            ------------------------------------ In science, 'fact' can only mean 'confirmed to such a degree that it would be perverse to withhold provisional assent.' I suppose that apples might start to rise tomorrow, but the possibility does not merit equal time in physics classrooms. Stephen J Gould

                            1 Reply Last reply
                            0
                            • realJSOPR realJSOP

                              Let's say I was working for a company a year or two ago, and during my tenure there, I came up with a configurable encryption mechanism that involved wrapping a given file with vendor-configurable encryption scheme. This way, the software could only be decrypted by software provided by the vendor, yet regardless of the encryption configuration used. Now, let's say that some software was being written that used this encryption system, but before it could be released, the company in question went out of business. Patent filing was discussed (before the company went under), but as far as I can find, it was never done. I realize there are no lawyers here, but does anyone think I would be violating any copyrights or anything if I were to write an article here about the encryption method I developed? I would be going completely from my memory of the code. BTW, the encryption system wasn't going to work for what they wanted, but they wanted it done, and this was the best I could come up with. The actual encryption mechanism worked great, what they wanted it for prevented other types of security to be used. They were streaming files over the web, and the decrypted files existed as temporary files on the user's hard drive. The company went under before we could try to address this issue (and truthfully, there was no fix for this issue due to extenuating circumstances).

                              .45 ACP - because shooting twice is just silly
                              -----
                              "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                              -----
                              "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                              P Offline
                              P Offline
                              PIEBALDconsult
                              wrote on last edited by
                              #23

                              Personally, I wouldn't worry about it and I don't care what any employer, past or... well... past, says about it. My feeling is that if the particular piece of code is application-specific, then it's theirs. If it is a more general-purpose piece of code that can be used in many applications then I consider it "mine" and I just happen to be allowing them to use it in their application free of charge because I'm a nice guy. Basically, if I'm assigned to create Foo and along the way I create a general-purpose Bar then I feel that Bar is mine, but Foo is theirs. About six of my articles are based on code that I wrote in response to requirements for an employer. Unfortunately, the situation you describe is likely trickier because you were tasked with creating the particular code rather than the code being just one technique that you used to solve an assigned task. On yet a third hand, you aren't planning on making money selling the code, so you probably shouldn't worry.

                              L 1 Reply Last reply
                              0
                              • R Rama Krishna Vavilala

                                The legal issue is not of the code but of technique. The code might be different but the technique might be same, so that will be a problem.

                                realJSOPR Offline
                                realJSOPR Offline
                                realJSOP
                                wrote on last edited by
                                #24

                                I found this text on the net regarding US laws: Fair Use. Even with that in mind, there are further limits to copyright. For example, partial or limited reproduction of another's work may be permitted under the doctrine of fair use. This doctrine is especially liberal where the use advances public interests such as education or scholarship and specifically permits making a backup copy of a program. Further, sellers of utility software, such as clip art or programming libraries, should permit hassle-free distribution of non-competing works created by licensed users. [Programmers should seriously consider whether to use the work of publishers who assert additional rights.] Beyond fair use, still more fundamental limits to copyright protection should be considered. Expressions are Protected, not Facts or Ideas. The basic idea is easily illustrated: An author of an online story has protection for her words, but not for facts that she went to the trouble to collect or her basic plot. Similarly, a programmer has protection from others' duplicating a segment of code but not from their writing different code to accomplish the same end. Protection for facts as such is probably not available, and processes can be protected, if at all, only by trade secrets or patents. [For more on the last option in particular, see Seeking Cost-Effective Patents, right-hand navigation bar.] That said, caution is nevertheless warranted. Copying someone's creative presentation of facts could easily infringe. Also, merely translating from one language into another may infringe -- just as would translating a novel from French to English. Independent Creation is Permitted. A second work, identical to an earlier copyrighted work, does not infringe, if it is, in fact, independently created. While a well-known first work of a very unique or fanciful kind may make an independent creation defense difficult to believe, the problem may be more complicated with regard to some kinds of software. Assume that, code has been copied with slight variations from the original, and it is claimed that function dictated form. A practical cure for the problem of showing that a work was in fact copied is to embed "identifiers" such as misspellings and useless loops or variables. The objective is to hide them so that they will show up in copies which are claimed to be, but are not, independently created. If so, the issue will no longer be the alleged copier's credibility. I think this pretty much says I can (legally) independ

                                R B C B M 6 Replies Last reply
                                0
                                • realJSOPR realJSOP

                                  I found this text on the net regarding US laws: Fair Use. Even with that in mind, there are further limits to copyright. For example, partial or limited reproduction of another's work may be permitted under the doctrine of fair use. This doctrine is especially liberal where the use advances public interests such as education or scholarship and specifically permits making a backup copy of a program. Further, sellers of utility software, such as clip art or programming libraries, should permit hassle-free distribution of non-competing works created by licensed users. [Programmers should seriously consider whether to use the work of publishers who assert additional rights.] Beyond fair use, still more fundamental limits to copyright protection should be considered. Expressions are Protected, not Facts or Ideas. The basic idea is easily illustrated: An author of an online story has protection for her words, but not for facts that she went to the trouble to collect or her basic plot. Similarly, a programmer has protection from others' duplicating a segment of code but not from their writing different code to accomplish the same end. Protection for facts as such is probably not available, and processes can be protected, if at all, only by trade secrets or patents. [For more on the last option in particular, see Seeking Cost-Effective Patents, right-hand navigation bar.] That said, caution is nevertheless warranted. Copying someone's creative presentation of facts could easily infringe. Also, merely translating from one language into another may infringe -- just as would translating a novel from French to English. Independent Creation is Permitted. A second work, identical to an earlier copyrighted work, does not infringe, if it is, in fact, independently created. While a well-known first work of a very unique or fanciful kind may make an independent creation defense difficult to believe, the problem may be more complicated with regard to some kinds of software. Assume that, code has been copied with slight variations from the original, and it is claimed that function dictated form. A practical cure for the problem of showing that a work was in fact copied is to embed "identifiers" such as misspellings and useless loops or variables. The objective is to hide them so that they will show up in copies which are claimed to be, but are not, independently created. If so, the issue will no longer be the alleged copier's credibility. I think this pretty much says I can (legally) independ

                                  R Offline
                                  R Offline
                                  Rama Krishna Vavilala
                                  wrote on last edited by
                                  #25

                                  That leaves me, more confused. :) I guess if your company complains or sends lawyers after you, you can always remove the article.

                                  John Simmons / outlaw programmer wrote:

                                  .45 ACP

                                  What is your opinion on Berretta PX4 Storm Sub Compat[^]? Do you have any other favorite compacts/sub-compacts?

                                  realJSOPR S 2 Replies Last reply
                                  0
                                  • R Rama Krishna Vavilala

                                    That leaves me, more confused. :) I guess if your company complains or sends lawyers after you, you can always remove the article.

                                    John Simmons / outlaw programmer wrote:

                                    .45 ACP

                                    What is your opinion on Berretta PX4 Storm Sub Compat[^]? Do you have any other favorite compacts/sub-compacts?

                                    realJSOPR Offline
                                    realJSOPR Offline
                                    realJSOP
                                    wrote on last edited by
                                    #26

                                    I'm gonna go ahead and see if I can't recreate the essential functionality, post an article about it, and see what happens.

                                    Rama Krishna Vavilala wrote:

                                    What is your opinion on Berretta PX4 Storm Sub Compat[^]? Do you have any other favorite compacts/sub-compacts?

                                    My view of sub-compacts is that you shouldn't spend a lot of money on them. You're probably going to be using it as a concealed carry weapon, and as such, there is a possibility that you'd either get it confiscated or forcibly taken away from you at some point. I'm thinking along the lines of a Taurus PT745. It's got a single-stack magazine which makes it more like my 1911 Government model. It also has a Pierce grip extender on the magazines so that my little finger doesn't wrap *under* the grip (that's really uncomfortable for me, and my wife doesn't like that either). It's light, relatively inexpensive, and reliable. For the record, I also have a XD40 Service (4-inch barrel), but I prefer the feel of my 1911 for shooting. The 1911 is harder to conceal than the XD40, which itself is harder to conceal compared to the Taurus.

                                    .45 ACP - because shooting twice is just silly
                                    -----
                                    "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                    -----
                                    "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                    1 Reply Last reply
                                    0
                                    • realJSOPR realJSOP

                                      I found this text on the net regarding US laws: Fair Use. Even with that in mind, there are further limits to copyright. For example, partial or limited reproduction of another's work may be permitted under the doctrine of fair use. This doctrine is especially liberal where the use advances public interests such as education or scholarship and specifically permits making a backup copy of a program. Further, sellers of utility software, such as clip art or programming libraries, should permit hassle-free distribution of non-competing works created by licensed users. [Programmers should seriously consider whether to use the work of publishers who assert additional rights.] Beyond fair use, still more fundamental limits to copyright protection should be considered. Expressions are Protected, not Facts or Ideas. The basic idea is easily illustrated: An author of an online story has protection for her words, but not for facts that she went to the trouble to collect or her basic plot. Similarly, a programmer has protection from others' duplicating a segment of code but not from their writing different code to accomplish the same end. Protection for facts as such is probably not available, and processes can be protected, if at all, only by trade secrets or patents. [For more on the last option in particular, see Seeking Cost-Effective Patents, right-hand navigation bar.] That said, caution is nevertheless warranted. Copying someone's creative presentation of facts could easily infringe. Also, merely translating from one language into another may infringe -- just as would translating a novel from French to English. Independent Creation is Permitted. A second work, identical to an earlier copyrighted work, does not infringe, if it is, in fact, independently created. While a well-known first work of a very unique or fanciful kind may make an independent creation defense difficult to believe, the problem may be more complicated with regard to some kinds of software. Assume that, code has been copied with slight variations from the original, and it is claimed that function dictated form. A practical cure for the problem of showing that a work was in fact copied is to embed "identifiers" such as misspellings and useless loops or variables. The objective is to hide them so that they will show up in copies which are claimed to be, but are not, independently created. If so, the issue will no longer be the alleged copier's credibility. I think this pretty much says I can (legally) independ

                                      B Offline
                                      B Offline
                                      Brady Kelly
                                      wrote on last edited by
                                      #27

                                      Unless they have patented the algorithm.

                                      realJSOPR 1 Reply Last reply
                                      0
                                      • B Brady Kelly

                                        Unless they have patented the algorithm.

                                        realJSOPR Offline
                                        realJSOPR Offline
                                        realJSOP
                                        wrote on last edited by
                                        #28

                                        I couldn't find anything during my patent search.

                                        .45 ACP - because shooting twice is just silly
                                        -----
                                        "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                        -----
                                        "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                        R 1 Reply Last reply
                                        0
                                        • realJSOPR realJSOP

                                          Yeah, I have design documentation that I wrote, as well as the document that I wrote and presented to a venture capitalist.

                                          .45 ACP - because shooting twice is just silly
                                          -----
                                          "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
                                          -----
                                          "The staggering layers of obscenity in your statement make it a work of art on so many levels." - J. Jystad, 2001

                                          L Offline
                                          L Offline
                                          Lost User
                                          wrote on last edited by
                                          #29

                                          I would not want to admit to something like this on a public forum; some employers would interpret this as theft of company property.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups