When it comes to innovative software
development, your intellectual property is your most valuable asset.
Unfortunately, options for protecting this asset from imitators are limited.
To protect yourself you can apply for a software
patent, but it's an expensive, time-consuming process with no guarantee. The
alternative is to find a work around, something that keeps your IP secure
without having to go through the U.S. patent office.
Below, nine technology executives from Forbes Technology Council offer their
best tips for protecting your
intellectual property without getting a software patent.
1. Keep It Close
Be very careful about any outsourcing partner you work with,
either domestically or overseas. Make sure they have adequate security in place
to protect your IP when they work on it. As well, be careful how your IP is
accessed by remote teams. Private repositories on sites like GitHub might be
very convenient, but you are handing over security to a third party. - James Dixon, Pentaho, a Hitachi Group Company
2. Cover Your Legal Bases And Encrypt Your
IP
When we work with a developer (local or overseas) we make to
sure to have strong legal agreements in place that are enforceable in the
developer’s local court system as well. We also employ strong encryption
internally for sensitive IP, and we make sure our partners employ the proper
levels of encryption. It seems like a lot of overhead, but it is far cheaper
than dealing with a breach of trust later. -Tim Maliyil, AlertBoot
3. Document
Everything
Beside as patent, keeping a running log or journal of what has
been done and when can help you defend your property if it is stolen. This
journal should start with the inception of the idea, include every meeting you
have, who was invited, and who attended. Using a product with a reliable date
and time stamp and having a paper copy of the important moments helps prove
ownership of your idea. -John Zahorsky, Eden Autism
4. Talk To An Expert
There are numerous ways to protect your IP,
such as patents, trademarks,
design rights and trade secrets. It's about accepting that you need expert
guidance early and preparation. What do you need to protect and how?
Where, when and what is the timeline for applying in different
regions? What do you need to budget for? Talk to the experts so you can
understand, prepare and budget. -David
Rajan, GlobalLogic
– Method
5. Idea Plus Execution Plus Cash Equals
Success
Great ideas are a dime a dozen -- at
least 10 people are working on your great idea right now! The winner
will execute well, getting the idea to market fast along with
the operating model needed to provide great customer service. And if
you've ever tried to start a business, you know your time frame to profit is 3x
your original plan. Cash is your life blood extending your timeline to success.
- Mike Brannan, Centric Consulting, LLC
6. Offer The Best Experience In Order To
Protect And Profit From Your IP
Besides applying for a patent,
I am not sure there is any other good option. Reverse engineering is becoming
commonplace, trade secrets are becoming more difficult to protect, and patent
trolls are appearing everywhere. I think offering the best experience to your
user with your technology is -- or should be -- the only way to properly profit
from it. - Chris Kirby, Voices.com
7. Move Fast
Depending on your idea, IP protection might be
a necessary evil. Necessary because it can provide some protection from others
attempting to copy you. At the same time, IP tends to be limited in its
application (protects your idea but not variants) and can be expensive to
defend. Instead, I always advise that IP is less important than speed to
commercialization. Move faster than the competition. - Scott Stiner, UM Technologies, LLC
8. Be Fast And Agile
Organize your technology department to be
flexible and agile -- staying fast and creative will keep you innovating ahead
of larger, slower competitors. - Erik Gustavson, Bitium
9. Use Good Security Measures
At a minimum, all source code should be
clearly labeled with a confidentiality notice, warning that unauthorized
use or reproduction is prohibited and should be kept on secure
systems within your facility. Only allow authorized personnel to
access it. When software is deployed into the field, consider using
third-party digital encryption solutions to wrap your software in a security
envelope. -Nathan Hayes, Modal
Technology Corporation
0 nhận xét:
Đăng nhận xét