Chester, United Kingdom (PressExposure) November 17, 2009 -- Information Escrow can protect product designs, manufacturing processes, marketing materials and industrial formulae. Designed specifically to protect the growing number of organizations who outsource the development of specific elements of their operations to a specialist third-party, any type of business-critical information can be covered. Often just as critical as software applications, business critical information currently protected by clients includes product designs, processes, industrial formulae and branding material/advertising campaigns by information escrow.
Intellectual Property (IP) escrow is the life blood of an organization. Whether it's a secret formula, manufacturing process that has been perfected over years, or customized software application, protecting confidential IP from inadvertent exposure is paramount. Both developers and partners access the repository for interaction and cooperation knowing the risk of full transference has been eliminated. While the Escrow agreement provides framework for the access level granted to both parties, the Secure Vault Suite speeds-up innovation while ensuring IP owners control of their data by providing visibility, search capabilities, robust reporting, and secure collaboration.
Intellectual Property (IP) escrow comprises of three unique solutions that extend the functionality of Escrowed Intellectual Property such as active escrow repository, secure inspection portal & secure development environment.
The Active Escrow Repository allows for "real-time" deposits into an Escrow account and produces sophisticated reports detailing the additions and changes to a source code repository. It also features on-demand decryption/encryption of files to reduce cycle time when accessing deposit information.
The Secure Inspection Portal allows companies to securely review a developer's confidential work without compromising the source code to unauthorized use. Users have the ability to view, inspect, and validate source code without modifying / replicating it, thereby ensuring IP loss risk mitigation. Multiple parties can review code simultaneously, encouraging a flexible workforce while reducing project resource costs.
The Secure Development Environment allows IP owners to extend controlled access to their proprietary source code to 3rd development partners. This fully featured, secure, development environment seamlessly integrates with CVS and Subversion (SVN). Instant remote access is available to view, inspect, validate, and co-develop source code.