SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Source Code Escrow Overview




Overview Presentation Deck
                 Presenter

            February 2009
Presentation Overview
 What Is It?
 Basic Elements Of The Agreement
 When Is It Used?
 How It Works – The Agreement
 How It Works – The Service




       Holding Trust Inc. – Source Code Escrow Overview   Slide 1
Presentation Overview, Cont’d
 Why Is It Used?
 Secondary Benefits
 Variations
 What To Look Out For / Best Practices
 How To Contact Us




       Holding Trust Inc. – Source Code Escrow Overview   Slide 2
What Is It?
 Has been around in many industries in
 order to mitigate risk
 It is used to facilitate the transfer of
 property from one individual to another
 Essentially it consists of an agreement
 between three parties:
   You
   Supplier (Third Party)
   Escrow Agent

         Holding Trust Inc. – Source Code Escrow Overview   Slide 3
Basic Elements Of The Agreement
 An item is deposited with a third person, an
 escrow agent
 It is held in trust or security
 It is delivered to the grantee or promisee on
 the fulfillment of certain future conditions




        Holding Trust Inc. – Source Code Escrow Overview   Slide 4
When Is It Used?
 Liquidation
 Cease of Trade / Business Interruption
 Failure to maintain or meet service level
 agreements (SLAs)
 IP rights assignment (if the new owner
 provides no escrow protection)
 Assist in transfer of ownership of IP rights
 Security investigation of outsourced
 developed applications
        Holding Trust Inc. – Source Code Escrow Overview   Slide 5
How It Works – The Agreement
 You enter agreement with
 agent and third party
                                                           You
 Third party supplies right
 and source code to agent
 Third party provides your
 organization with the
 application                                                      Third
                                    Escrow
                                                                  Party
                                     Agent
                                                                 Supplier

        Holding Trust Inc. – Source Code Escrow Overview          Slide 6
How It Works – The Service
                                            Business interruption
                                            occurs by the third
             You                            party supplier
                                            You contact the
                                            escrow agent notifying
                                            of event
                    Third                   Escrow agent
Escrow              Party
                                            validates the concern
 Agent             Supplier
                                            and releases the
                                            source code to you
         Holding Trust Inc. – Source Code Escrow Overview   Slide 7
Why Is It Used?
 Peace of mind
 Scary marketplace where suppliers may
 go out of business
 Hedging your bets during application
 development
 Important aspect of risk management,
 business continuity and disaster
 recovery planning
 To be up and running in minimal time

       Holding Trust Inc. – Source Code Escrow Overview   Slide 8
Secondary Benefits
 Encourages your supplier to apply
 safeguards internally to protect itself
 and its customers, as they want to
 protect the source code
 In the event of a business interruption,
 the quicker your operations are up and
 running the more able you are to retain
 positive branding


        Holding Trust Inc. – Source Code Escrow Overview   Slide 9
Variations
 SaaS application / data
 Storage / transfer of decryption keys
 Transfer of Website ownership
 Third party critical applications
 Outsourced development of applications
 Other…




       Holding Trust Inc. – Source Code Escrow Overview   Slide 10
What To Look Out For / Best Practices
  Hire an unbiased escrow agent
  Check certifications
  Include documentation in escrow
  Involve change management
  Create a hash for validation purposes
  Validate the software
  Ensure that data is protected (e.g. SaaS)


         Holding Trust Inc. – Source Code Escrow Overview   Slide 11
How To Contact Us
 Web
  www.holdingtrust.com
  www.holdintrust.com
 Phone
  +1 416.910.5183
 Email
  info@holdingtrust.com




         Holding Trust Inc. – Source Code Escrow Overview   Slide 12

Mais conteúdo relacionado

Semelhante a Holding Trust Inc. - Escrow Overview

Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
Mani Soft International
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
lucydavidson
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
Kyle Conklin
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation Final
Tony_Clarke
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
Peister
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
tnguyenaci
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
Jojo Colina
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
Janine Anthony Bowen, Esq.
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
ejervis
 

Semelhante a Holding Trust Inc. - Escrow Overview (20)

Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
Top 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfallsTop 6 provisions you should know to prevent outsourcing pitfalls
Top 6 provisions you should know to prevent outsourcing pitfalls
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 
Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
 
Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012Third Party Risk Due Diligence - Feb 2012
Third Party Risk Due Diligence - Feb 2012
 
What the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to KnowWhat the Cloud Vendors Don't Want You to Know
What the Cloud Vendors Don't Want You to Know
 
Pricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP TransactionsPricing Intellectual Proper Litigation Risk In IP Transactions
Pricing Intellectual Proper Litigation Risk In IP Transactions
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
2020 vrm expert reference guide
2020   vrm expert reference guide2020   vrm expert reference guide
2020 vrm expert reference guide
 
Escrow Presentation Final
Escrow Presentation FinalEscrow Presentation Final
Escrow Presentation Final
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
ACI's AML & OFAC Compliance for the Insurance Industry PPT (Day 2)
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Escrow Presentation
Escrow PresentationEscrow Presentation
Escrow Presentation
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Holding Trust Inc. - Escrow Overview

  • 1. Source Code Escrow Overview Overview Presentation Deck Presenter February 2009
  • 2. Presentation Overview What Is It? Basic Elements Of The Agreement When Is It Used? How It Works – The Agreement How It Works – The Service Holding Trust Inc. – Source Code Escrow Overview Slide 1
  • 3. Presentation Overview, Cont’d Why Is It Used? Secondary Benefits Variations What To Look Out For / Best Practices How To Contact Us Holding Trust Inc. – Source Code Escrow Overview Slide 2
  • 4. What Is It? Has been around in many industries in order to mitigate risk It is used to facilitate the transfer of property from one individual to another Essentially it consists of an agreement between three parties: You Supplier (Third Party) Escrow Agent Holding Trust Inc. – Source Code Escrow Overview Slide 3
  • 5. Basic Elements Of The Agreement An item is deposited with a third person, an escrow agent It is held in trust or security It is delivered to the grantee or promisee on the fulfillment of certain future conditions Holding Trust Inc. – Source Code Escrow Overview Slide 4
  • 6. When Is It Used? Liquidation Cease of Trade / Business Interruption Failure to maintain or meet service level agreements (SLAs) IP rights assignment (if the new owner provides no escrow protection) Assist in transfer of ownership of IP rights Security investigation of outsourced developed applications Holding Trust Inc. – Source Code Escrow Overview Slide 5
  • 7. How It Works – The Agreement You enter agreement with agent and third party You Third party supplies right and source code to agent Third party provides your organization with the application Third Escrow Party Agent Supplier Holding Trust Inc. – Source Code Escrow Overview Slide 6
  • 8. How It Works – The Service Business interruption occurs by the third You party supplier You contact the escrow agent notifying of event Third Escrow agent Escrow Party validates the concern Agent Supplier and releases the source code to you Holding Trust Inc. – Source Code Escrow Overview Slide 7
  • 9. Why Is It Used? Peace of mind Scary marketplace where suppliers may go out of business Hedging your bets during application development Important aspect of risk management, business continuity and disaster recovery planning To be up and running in minimal time Holding Trust Inc. – Source Code Escrow Overview Slide 8
  • 10. Secondary Benefits Encourages your supplier to apply safeguards internally to protect itself and its customers, as they want to protect the source code In the event of a business interruption, the quicker your operations are up and running the more able you are to retain positive branding Holding Trust Inc. – Source Code Escrow Overview Slide 9
  • 11. Variations SaaS application / data Storage / transfer of decryption keys Transfer of Website ownership Third party critical applications Outsourced development of applications Other… Holding Trust Inc. – Source Code Escrow Overview Slide 10
  • 12. What To Look Out For / Best Practices Hire an unbiased escrow agent Check certifications Include documentation in escrow Involve change management Create a hash for validation purposes Validate the software Ensure that data is protected (e.g. SaaS) Holding Trust Inc. – Source Code Escrow Overview Slide 11
  • 13. How To Contact Us Web www.holdingtrust.com www.holdintrust.com Phone +1 416.910.5183 Email info@holdingtrust.com Holding Trust Inc. – Source Code Escrow Overview Slide 12